Snort mailing list archives
Re: Rules for ssh exploit
From: Fyodor <fygrave () tigerteam net>
Date: Mon, 12 Nov 2001 11:45:57 +0700
On Mon, Nov 12, 2001 at 10:57:15AM +0100, Ralf Hildebrandt wrote:
On Fri, Nov 02, 2001 at 04:34:57PM +1300, Russell Fulton wrote:Does any one have snort rules for detecting the recent spate of ssh attacks or are all the usable fingerprints hidden by the encryption?http://staff.washington.edu/dittrich/misc/ssh-analysis.txt
It is actually quite hard to catch ssh exploit attempt with simple pkt-matching signature. IMHO this is the place where definetely a protocol analysis would make more sense. Different exploits that I have seen, look quite different from network layer perspective.. _______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users
Current thread:
- Rules for ssh exploit Russell Fulton (Nov 01)
- Re: Rules for ssh exploit Ralf Hildebrandt (Nov 12)
- Re: Rules for ssh exploit Fyodor (Nov 12)
- Re: Rules for ssh exploit Martin Roesch (Nov 12)
- Re: Rules for ssh exploit Ralf Hildebrandt (Nov 12)