88
I Use This!
High Activity

News

Analyzed 1 day ago. based on code collected 1 day ago.
Posted about 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 06/16/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 52 new rules and made modifications to 4 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Yaser Mansour34917Avery Tarasov3462234852Talos's rule release: Talos has added and modified multiple rules in the browser-ie, browser-plugins, file-other, malware-cnc, netbios and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted about 10 years ago by [email protected] (Russ Combs)
Just pushed build 157 to github (snortadmin/snort3):port ssl from snortfix stream_tcp to call splitter finish only if scan was calledchanged drop rules drop current packet onlyunchanged - block rules block all packets on flowadded reset rules to ... [More] function as rejectdeleted sdrop and sblock rules; use suppressions insteadrefactored active moduleupdated snort2lua [Less]
Posted about 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 06/10/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 78 new rules and made modifications to 27 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Didier Stevens34864Avery Tarasov3484334868Talos's rule release: Talos has added and modified multiple rules in the blacklist, browser-ie, browser-plugins, file-flash, file-office, file-other, file-pdf, indicator-compromise, malware-cnc, malware-other, os-linux, policy-other, server-mssql, server-oracle and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted about 10 years ago by [email protected] (Joel Esler)
In accordance with our EOL policy, this is a reminder that Snort 2.9.7.0 is now End of Life (EOL).According to our download stats, most of you have transitioned off of 2.9.7.0 at this point, which is fantastic, however, there are still people using ... [More] that version.  Please take the opportunity at this point to transition to our newest release (Snort 2.9.7.3), available from the Snort.org Downloads page.Thank you! [Less]
Posted about 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 06/09/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 73 new rules and made modifications to 12 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community RulesetTalos's rule release: Synopsis:Talos is aware of vulnerabilities affecting products from MicrosoftCorporation.Details:Microsoft Security Bulletin MS15-056:Microsoft Internet Explorer suffers from programming errors that maylead to remote code execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 31284, 31286, 32262through 32263, 34721 through 34730, 34733 through 34736, 34745 through34760, 34763 through 34768, 34772 through 34773, 34778 through 34779,and 34790 through 34791.Microsoft Security Bulletin MS15-057:A coding deficiency exists in Microsoft Windows Media Player that maylead to remote code execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 34731 through 34732.Microsoft Security Bulletin MS15-059:A coding deficiency exists in Microsoft Office that may lead to remotecode execution.Previously released rules will detect attacks targeting thisvulnerability and have been updated with the appropriate referenceinformation. They are included in this release and are identified withGID 1, SIDs 18494 through 18945.New rules to detect attacks targeting these vulnerabilities are alsoincluded in this release and are identified with GID 1, SIDs 34737through 34740, and 34743 through 34744.Microsoft Security Bulletin MS15-061:Microsoft Windows Kernel suffers from programming errors that may leadto an escalation of privilege.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 34761 through 34762,34770 through 34771, 34774 through 34777, and 34780 through 34789.Microsoft Security Bulletin MS15-062:A coding deficiency exists in Microsoft Active Directory FederationServices that may lead to an escalation of privilege.A rule to detect attacks targeting this vulnerability is included inthis release and is identified with GID 1, SID 34769.Talos has also added and modified multiple rules in the browser-ie,browser-plugins, deleted, file-flash, file-office, file-other,os-windows, protocol-voip and server-webapp rule sets to providecoverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted about 10 years ago by [email protected] (Joel Esler)
As always, on the website we keep the master record of the snort.conf file for each version of Snort available, and keep this up to date with every supported release of Snort. I know I'm a bit behind in moving these between servers, but here they ... [More] are.  Especially useful for Windows users, as the snort.conf in packaged version of Windows on the website is a bit behind.  (Thanks Michael Steele for pointing that out)Download the default snort.conf files on the website.Thanks! [Less]
Posted about 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 06/04/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 97 new rules and made modifications to 260 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Talos has added and modified multiple rules in the blacklist, browser-ie, browser-plugins, exploit-kit, file-flash, file-identify, file-office, file-other, file-pdf, malware-cnc, os-windows, protocol-dns, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted about 10 years ago by [email protected] (Russ Combs)
Just pushed build 156 to github (snortadmin/snort3):new_http_inspect switch to bitset for event trackingfixed stream tcp handling of paf abortfixed stream tcp cleanup on resetfixed sequence of flush and flow data cleanup for new http inspect
Posted about 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 06/02/2015We welcome the introduction of the newest rule release from Talos. In this release we introduced 28 new rules and made modifications to 81 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: Talos has added and modified multiple rules in the blacklist, browser-ie, file-image, file-multimedia, file-office, file-other, file-pdf, malware-cnc, netbios, os-windows, protocol-dns, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted about 10 years ago by [email protected] (Russ Combs)
Snort++ build 155 is now available on snort.org.  This is the latest monthly update of the downloads.  You can also get the latest updates from github (snortadmin/snort3) which is updated weekly.New Featuresported smtp inspector from Snortported file ... [More] capture from Snortadded file_magic.luaadded socket DAQ to input payload only with flow tupleadded hext DAQ to for packet input in hex and plain textadded file DAQ for plain file input (w/o packets)added socket codec for use with above DAQsadded stream_user for payload only processingadded stream_file for file inspection and processingEnhancementschanged new_http_inspect parsing and event handlingchanged stream_tcp to reassemble payload onlychanged -K to -L (log type)changed hex dumps to 20 hex bytes per line instead of 16rewrote alert_csv with all new default format Bug fixesfixed dns inspector typo for tcp checksfixed config error for inspection of rebuilt packetsfixed autotools build of manual wrt pluginsfixed xcode static analysis issuesfixed other misc bugsOther Changesupdated default manualsupdated usage from blogupdated unified2 to support data only packetsdeleted alert_testdeleted obsolete REG_TEST loggingPlease submit bugs, questions, and feedback to [email protected] or the Snort-Users mailing list.Happy Snorting!The Snort Release Team [Less]