-
Network detection rule for CVE-2019-0708 in
#RDP. Based on internal research@NCCGroupInfosec & public scripts, tested with#Suricata. See: https://github.com/nccgroup/Cyber-Defence/blob/master/Signatures/suricata/2019_05_rdp_cve_2019_0708.txt … - thanks to@2sec4u and@EmergingThreatspic.twitter.com/mMjqrZ40f6
-
I updated the VxWorks exploitation detection rules with the tcp.hdr keyword usage instead of the LUA scripting engine. tcp.hdr keyword works as intended in Suricata 5.0.1! https://github.com/sud0woodo/Urgent11-Suricata-LUA-scripts/blob/master/urgent11_rules.txt …
#suricata -
SuricataAE -
@Suricata_IDS Alerting in Elastic is now open source: https://github.com/3CORESec/SuricataAE …
We've also written a few words about this release in our weblog, which you can read here: https://blog.3coresec.com/2019/11/suricataae-suricata-alerting-in-elastic.html …
Let us know what you think!
#OpenSource#Suricata -
Network detection rule for CVE-2019-0708 in RDP tested with
#Suricata https://github.com/nccgroup/Cyber-Defence/blob/master/Signatures/suricata/2019_05_rdp_cve_2019_0708.txt … -
a Go client library for interacting with
#suricata using the unix socket: https://github.com/ks2211/go-suricata … -
We are happy to release bpfctrl a tool dedicated to eBPF maps management in
#suricata world https://github.com/StamusNetworks/bpfctrl …#pts9 -
On my way to
@UYBHYS to give a workshop on threat hunting with#suricata. pic.twitter.com/9wRGqO4dHh
-
Scared by latest CVE-2020-0601 certificate spoofing vulnerability? We did a
#suricata detection rule for you. It covers all known exploitations of TLS certificates and executable signing. Find it here: https://github.com/ptresearch/AttackDetection/blob/master/CVE-2020-0601/cve-2020-0601.rules …#ChainOfFools#CurveBall -
You can do this with
#Suricata eve.json log and wireshark today with a Lua script from@Regiteric - https://github.com/regit/suriwire -
Today we're pleased to announce the GA release of OPNids. After testing many early stage releases, this release is now suitable for usage in production environments. Download now and explore
#MLE/@Suricata_IDS integration! http://bit.ly/2rKC73I#Suricata#PacketCapturepic.twitter.com/AN1acfyVUc
-
-
My blog post about how
#suricata can protect#voip networks:https://www.glongo.it/2019/11/28/Suricata-and-VoIP-Networks/ … -
#ntopng +#Suricata: Unifying Visibility with Security https://www.ntop.org/ntopng/ntopng-suricata-unifying-visibility-with-security/ … -
Call for testing: New netmap kernel on OPNsense https://forum.opnsense.org/index.php?topic=11477.msg55261#msg55261 …
#OPNsense#Suricata#Sensei#FreeBSD#HardenedBSD -
Analysis of the
#Machete malware results in#suricata signatures, details here: http://travisgreen.net/2019/08/14/machete-malware.html …@OISFoundation@Suricata_IDS@ESETresearch@ESET#cyberespionage#backdoor#infosec -
Yo
#suricata or#snort rule writers, I put in some modifications for this script to help create simple signatures detecting domains in SSL certs or TLS SNI. Now using new@suricata 5 keywords / classtypes >>https://github.com/malwareforme/ssl_sigs … -
Feels good to be back to contributing to an open source project. It's been some time since
@EnderUNIX https://github.com/OISF/suricata/commit/f7c00a175352c0b4c5681f1f498bbbaebe503052 …#Suricata#OPNsense#Sensei#EnderUNIX@sunnyvalley -
This class is great for those wanting to understand how
@Suricata_IDS rules/sigs work. Learning how to understand, modify and tune will be of great help if you deploy#Suricata. And of course you'll be able to write your own too! https://twitter.com/switchingtoguns/status/1181600200407707650 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.