EasyManua.ls Logo

ELTEX ESR Series - Page 411

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR-Series. User manual
411
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
smtp.rules
These rules contain signatures of vulnerabilities in the SMTP protocol, signs of
incorrect use of the SMTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
sql.rules
These rules contain vulnerability signatures for SQL DBMS.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
telnet.rules
These rules contain signatures of vulnerabilities in the telnet protocol, signs of
incorrect use of the telnet protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
tftp.rules
These rules contain signatures of vulnerabilities in the TFTP protocol, signs of
incorrect use of the TFTP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
trojan.rules
These rules contain signs of network activity of Trojans.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
user_agents.rules
These rules contain signs of suspicious and potentially dangerous HTTP clients
(identified by the values in the User-Agent HTTP header).
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
l.rules
These rules contain vulnerability signatures for VOIP protocol.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_client.rules
These rules contain vulnerability signatures for WEB clients.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_server.rules
These rules contain vulnerability signatures for WEB servers.
https://
rules.emergingthreats.net/
open/suricata/rules/emerging-
web_specific_apps.rules
These rules contain vulnerability exploitation signatures for WEB applications.

Table of Contents

Related product manuals