[Snort-users] Rules for ssh exploit

Russell Fulton r.fulton at ...3809...
Thu Nov 1 19:36:07 EST 2001

Hi All,
	Does any one have snort rules for detecting the recent spate of 
ssh attacks or are all the usable fingerprints hidden by the encryption?

Russell Fulton, Computer and Network Security Officer
The University of Auckland,  New Zealand

More information about the Snort-users mailing list