[Snort-users] Is there a ruleset for breakingpoint malicious traffic?

C. Marshall cmarshall at ...1935...
Mon Aug 6 12:45:11 EDT 2012

The VRT rule set is well suited to do what you are trying to accomplish.
Each Strike on the Breaking Point device has a corresponding reference type
such as CVE that you can call up. Match up the references in the VRT rule
set with whichever Strikes you're running in your detection testing.

On Sun, Aug 5, 2012 at 10:54 PM, MuSung Kim <mskim17 at ...11827...> wrote:

> hello list.
> There are malicious traffics in Breakingpoint Device.
> I know that malicious traffics are attack traffic against many CVE code.
> maybe
> For detection testing, i need ruleset for that.
> who do know about this?
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Snort-users mailing list
> Snort-users at lists.sourceforge.net
> Go to this URL to change user options or unsubscribe:
> https://lists.sourceforge.net/lists/listinfo/snort-users
> Snort-users list archive:
> http://www.geocrawler.com/redir-sf.php3?list=snort-users
> Please visit http://blog.snort.org to stay current on all the latest
> Snort news!

Christopher Marshall
VRT Response Manager
Sourcefire's Vulnerability Research Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-users/attachments/20120806/11dc328d/attachment.html>

More information about the Snort-users mailing list