Snort mailing list archives
new rule for detecting VxWorks debugging reply access
From: rmkml <rmkml () yahoo fr>
Date: Wed, 20 Jun 2012 01:07:07 +0200 (CEST)
Hi, Im curious if anyone fire this rule ? alert tcp any 6543 -> any any (msg:"MISC VxWorks debugging reply access"; flow:from_server,established; content:"|06|*["; depth:3; offset:24; content:"]["; within:2; distance:3; content:"]"; within:1; distance:12; classtype:attempted-admin; sid:1; rev:1; ) Example: ......*[000][22:28:17.030].......... Regards Rmkml http://twitter.com/rmkml ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- new rule for detecting VxWorks debugging reply access rmkml (Jun 19)
- Re: new rule for detecting VxWorks debugging reply access Tony Robinson (Jun 19)
- Re: new rule for detecting VxWorks debugging reply access Eric G (Jun 20)
- Re: new rule for detecting VxWorks debugging reply access Tony Robinson (Jun 19)