I'm trying to write a snort rule for this vulnerability; http://ift.tt/1EN92nP however for me to be able to write a good snort rule I need to understand how the software is actually vulnerable so I can write my rule around this. However I am struggling to understand where to look for the vulnerability within the network packets. Any help would be appreciated.
Aucun commentaire:
Enregistrer un commentaire