88
I Use This!
High Activity

News

Analyzed 1 day ago. based on code collected 1 day ago.
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/28/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 13 new rules and made modifications to 44 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Avery Tarasov32225Talos's rule release: The VRT has added and modified multiple rules in the browser-chrome, malware-cnc, server-other and sql rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/23/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 29 new rules and made modifications to 16 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: The VRT has added and modified multiple rules in the blacklist, browser-ie, file-other, file-pdf, malware-cnc, os-other, pua-adware, server-mail and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Joel Esler)
With the release of Snort 2.9.7.0, in accordance with our EOL policy, we've placed an EOL date on Snort version 2.9.5.6.Please take a moment and review our EOL policy on our webpage, and review the 2.9.5.6 EOL date (January 21, 2015)If there are any questions, please head on over to the Snort-users mailing list found on our Community Page.
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/23/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 45 new rules and made modifications to 9 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: The VRT has added and modified multiple rules in the blacklist, deleted, file-flash, file-multimedia, file-other, malware-cnc, os-mobile, protocol-snmp, server-oracle and server-webapp rule sets to provide coverage for emerging threats from these technologies.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted over 10 years ago by [email protected] (Joel Esler)
Snort 2.9.7.0 is now available on snort.org athttp://www.snort.org/downloads in the Snort Stable Release section.A new DAQ build is also available that updates support for a fewoperating systems.Snort 2.9.7.0 includes a major new feature for ... [More] Application Identification, our OpenAppID capability. In conjunction with this release, are shifting the license for the OpenAppId content to GPLv2 to encourage more use and submission back to Cisco. If you are interested in learning and writing OpenAppId content, please join us on the OpenAppId mailing list at https://www.snort.org/community. Any submissions to the OpenAppId ecosystem will receive public thanks and perhaps some nice swag!2014-10-24 - Snort 2.9.7.0[*] New additions* Application Identification Preprocessor, when used in conjunction withOpenAppID detector content, that will identify application protocol,client, server, and web applications (including those using SSL) andinclude the info in Snort alert data. In addition, a new rule optionkeyword 'appid' that can be used to constrain Snort rules based on oneor more applications that are identified for the connection. Separateprepackaged RPMs with App Open ID are available. See README.appidfor further details.* A new protected_content rule option that is used to match against acontent that is hashed. It can be used to obscure the full contextof the rule from the administrator.* Protocol Aware Flushing (PAF) improvements for SMTP, POP, and IMAP tomore accurately process different portions of email messages and fileattachments.* Added ability to test normalization behavior without modifyingnetwork traffic. When configured using na_policy_mode:inline-test,statistics will be gathered on packet normalizations that would haveoccurred, allowing less disruptive testing of inline deployments.* The HTTP Inspection preprocessor now has the ability to decompressDEFLATE and LZMA compressed flash content and DEFLATE compressed PDFcontent from http responses when configured with the newdecompress_swf and decompress_pdf options. This enhancement can beused with existing rule options that already match againstdecompressed equivalents.* Added improved XFF support to HttpInspect. It is now possible tospecify custom HTTP headers to use in place of 'X-Forwarded-For'. Insituations where traffic may contain multiple XFF-like headers, it ispossible to specify which headers hold precedence.* Added additional support for Heartbleed detection within the SSLpreprocessor to improve performance.* Added control socket command to dump packets to a file. SeeREADME.snort_dump_packets_control for details.* Added an option to suppress configuration information logging tooutput.* The Stream5 preprocessor functionality is now split between the newSession and Stream6 preprocessors.[*] Improvements* Maximum IP6 extensions decoded is now configurable.* Update active response to allow for responses of 1500+ bytes that spanmultiple TCP packets.* Check limits of multiple configurations to not exceed a maximum ID of4095.* Updated the error output of byte_test, byte_jump, byte_extract toincluding details on offending options for a given rule.* Update build and install scripts to install preprocessor and enginelibraries into user specified libdir.* Improved performance of IP Reputation preprocessor.* The control socket will now report success when reloading empty IPReputation whitelists/blacklists.* All TCP normalizations can now be enabled individually. SeeREADME.normalize for details on using the new options. Forconsistency with other options, the "urp" tcp normalization keywordnow enables the normalization instead of disabling it.* Lowered memory demand of Unicode -> ASCII mapping in HttpInspect.* Updated profiler output to remove duplicate results when usingmultiple configurations.* Improved performance of FTP reassembly.* Improved compatibility with Mac OSX 10.9 (Mavericks), OpenBSD,FreeBSD, and DragonFlyBSD [Less]
Posted over 10 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/21/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 27 new rules and made modifications to 8 additional rules. There were no changes made to ... [More] the snort.conf in this release.Talos's rule release: The VRT has added and modified multiple rules in the blacklist, browser-firefox, browser-ie, file-identify, file-other, malware-backdoor, malware-cnc, malware-other, os-other, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies. As a reminder:  Snort 2.9.6.1 is now EOL, please update to 2.9.6.2.In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted almost 11 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/16/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 22 new rules and made modifications to 15 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Avery Tarasov32225Talos's rule release: The VRT has added and modified multiple rules in the blacklist, browser-ie, file-flash, file-java, malware-cnc, protocol-ftp and server-other rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted almost 11 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/15/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 26 new rules and made modifications to 10 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Avery Tarasov32196Talos's rule release: The VRT has added and modified multiple rules in the blacklist, browser-ie, file-office, malware-cnc, os-windows, protocol-voip and server-webapp rule sets to provide coverage for emerging threats from these technologies. In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted almost 11 years ago by [email protected] (Joel Esler)
Just released:Snort Subscriber Rule Set Update for 10/14/2014We welcome the introduction of the newest rule release from Talos. In this release we introduced 56 new rules and made modifications to 9 additional rules. There were no changes made to ... [More] the snort.conf in this release. Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:Avery Tarasov32130All detection related to our Group 72 coverage has also been released into the Community Ruleset for free: http://blogs.cisco.com/talos/threat-spotlight-group-72/Talos's rule release:Details:Microsoft Security Bulletin MS14-056:Microsoft Internet Explorer suffers from programming errors that maylead to remote code execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 32137 through 32138,32153 through 32164, 32166 through 32169 and 32182 through 32185.Microsoft Security Bulletin MS14-057:A coding deficiency exists in Microsoft .NET Framework that may lead toremote code execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 32139 through 32140and 32149 through 32152.Microsoft Security Bulletin MS14-058:A coding deficiency exists in a Microsoft Kernel-Mode driver that maylead to remote code execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 32141 through 32146and 32190 through 32191.Microsoft Security Bulletin MS14-059:A programing error in Microsoft ASP.NET MVC may lead to a securityfeature bypass.A previously released rule will detect attacks targeting thisvulnerability and has been updated with the appropriate referenceinformation. It is included in this release and is identified with GID1, SID 7070.Microsoft Security Bulletin MS14-061:A coding deficiency exists in Microsoft Word and may lead to remotecode execution.Rules to detect attacks targeting these vulnerabilities are included inthis release and are identified with GID 1, SIDs 32147 through 32148.The VRT has added and modified multiple rules in the blacklist,browser-ie, file-identify, file-office, file-other, file-pdf,malware-backdoor, malware-cnc and policy-other rule sets to providecoverage for emerging threats from these technologies.For more details about these Microsoft vulnerabilities, please read our in-depth coverage post here:http://blogs.cisco.com/talos/microsoft-tuesday-october-2014/In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://www.snort.org/products. Make sure and stay up to date to catch the most emerging threats! [Less]
Posted almost 11 years ago by [email protected] (Joel Esler)
Snort 2.9.6.1 is now EOL for rule support.This means we will no longer be releasing updates for this version of the rule engine. Users of this version are now encouraged to upgrade to the latest version of Snort, which is now Snort 2.9.6.2.Please review our EOL policy here: https://www.snort.org/eol