EasyManua.ls Logo

ELTEX ESR Series - Page 410

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR-Series. User manual
410
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
misc.rules
These rules contain different vulnerabilities signatures.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
mobile_malware.rules
These rules contain malware signatures for mobile platforms.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
netbios.rules
These rules contain signatures of vulnerabilities in the NetBIOS protocol, signs of
incorrect use of the NetBIOS protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
p2p.rules
These rules describe signs of access to P2P networks (Bittorrent, Gnutella, Limewire).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
policy.rules
These rules describe unwanted network activity (access to MySpace, Ebay).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
poprules
These rules contain signatures of vulnerabilities in the POP3 protocol, signs of
incorrect use of the POP3 protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
rpc.rules
These rules contain signatures of vulnerabilities in the RPC protocol, signs of
incorrect use of the RPC protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
scada.rules
These rules contain vulnerability signatures for SCADA systems.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
scan.rules
These rules describe signs of activity associated with network scanning (Nessus,
Nikto, portscanning).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
shellcode.rules
These rules describe signs of activity associated with attempts to gain shell access
as a result of exploits.

Table of Contents

Related product manuals