[Snort-users] DOS attacks

Lurene A Grenier lurene.grenier at ...1935...
Thu Mar 13 10:26:29 EDT 2008

Nessus doesn't actually exploit any vulnerabilities; it only checks banners
and parses out the versions to determine if it thinks you're vulnerable to
something.   As such, it's not doing anything actually malicious and its
activity shouldn't be detected in most cases.


Snort rules will generally only detect actual attacks as they focus on
detecting triggering conditions necessary to actually exploiting the
vulnerability in question.



Lurene A Grenier, 

Analyst Team Lead

Senior Research Engineer


Office: (410) 423-1918

Mobile: (703) 839-3898


SourceFire Inc. o"  )~



From: snort-users-bounces at lists.sourceforge.net
[mailto:snort-users-bounces at lists.sourceforge.net] On Behalf Of Kamran Shafi
Sent: Thursday, March 13, 2008 2:43 AM
To: snort-users at lists.sourceforge.net
Subject: [Snort-users] DOS attacks



Is there a specific preprocessor to handle DOS attacks in Snort or it is
only done through the Snort rules? In specific, I couldn't find any rules
for flooding DOS attacks and the classical DOS attacks like land and
teardrop. Do I have to write my own rules to cater for these types of


Further, I am conducting a full Nessus scan but Snort is only reporting very
few alerts (20 odd). Is it normal? 


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-users/attachments/20080313/df16b03b/attachment.html>

More information about the Snort-users mailing list