mardi 24 mars 2015

understanding the vulnerability to write a snort rule



I'm trying to write a snort rule for this vulnerability; http://ift.tt/1EN92nP however for me to be able to write a good snort rule I need to understand how the software is actually vulnerable so I can write my rule around this. However I am struggling to understand where to look for the vulnerability within the network packets. Any help would be appreciated.





Aucun commentaire:

Enregistrer un commentaire