[Snort-users] Rules for ssh exploit

Russell Fulton r.fulton at ...3809...
Thu Nov 1 19:36:07 EST 2001


Hi All,
	Does any one have snort rules for detecting the recent spate of 
ssh attacks or are all the usable fingerprints hidden by the encryption?

Russell Fulton, Computer and Network Security Officer
The University of Auckland,  New Zealand









More information about the Snort-users mailing list