ESR series service routers.ESR-Series. User manual
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
smtp.rules
These rules contain signatures of vulnerabilities in the SMTP protocol, signs of
incorrect use of the SMTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
sql.rules
These rules contain vulnerability signatures for SQL DBMS.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
telnet.rules
These rules contain signatures of vulnerabilities in the Telnet protocol, signs of
incorrect use of the Telnet protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
tftp.rules
These rules contain signatures of vulnerabilities in the TFTP protocol, signs of
incorrect use of the TFTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
trojan.rules
These rules contain signs of network activity of Trojans.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
user_agents.rules
These rules contain signs of suspicious and potentially dangerous HTTP clients
(identified by the values in the User-Agent HTTP header).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
l.rules
These rules contain vulnerability signatures for VoIP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_client.rules
These rules contain vulnerability signatures for web clients.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_server.rules
These rules contain vulnerability signatures for web servers.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_specific_apps.rules
These rules contain vulnerability exploitation signatures for WEB applications.