[prev in list] [next in list] [prev in thread] [next in thread] 

List:       snort-sigs
Subject:    Re: [Snort-sigs] Help Needed to identify rules about SID: 1-44640
From:       Alex McDonnell <amcdonnell () sourcefire ! com>
Date:       2020-01-30 16:49:23
Message-ID: CAK6Z=_XwGyOp8VyCs_v+eE_kdszbWXiTFyweGx1ce9FU8LNyQQ () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hi Manesh,

that rule is available to download as part of the registered users rules
from https://snort.org/downloads/#rule-downloads

Please make sure you register and login to gain access to the download
(it's free!)

Alex McDonnell
Talos

On Thu, Jan 30, 2020 at 10:19 AM Manesh T via Snort-sigs <
snort-sigs@lists.snort.org> wrote:

> Dear All,
> Greetings.
> I would like to see the rules for WPA2 KRACK Vulnerabilities created by
> Snort.
> The corresponding CVE is 2017-13077.
> The signature ID is 1-44640.
>
> I would be thankful to you if you could help to identify or see or
> download the rules created for the aforementioned vulnerabilities.
>
> I have installed Snort's latest version and latest rule update in Windows.
>
> Your help will greatly support my research works.
>
> Could you anybody help me.
>
> Thank you
> Manesh
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs@lists.snort.org
> https://lists.snort.org/mailman/listinfo/snort-sigs
>
> Please visit http://blog.snort.org for the latest news about Snort!
>
> Please follow these rules:
> https://snort.org/faq/what-is-the-mailing-list-etiquette
>
> Visit the Snort.org to subscribe to the official Snort ruleset, make sure
> to stay up to date to catch the most <a href="
> https://snort.org/downloads/#rule-downloads">emerging threats</a>!
>

[Attachment #5 (text/html)]

<div dir="ltr">Hi Manesh,<div><br></div><div>that rule is available to download as \
part of the registered users rules from  <a \
href="https://snort.org/downloads/#rule-downloads">https://snort.org/downloads/#rule-downloads</a> \
</div><div><br></div><div>Please make sure you register and login to gain access to \
the download (it&#39;s free!)</div><div><br></div><div>Alex \
McDonnell</div><div>Talos</div></div><br><div class="gmail_quote"><div dir="ltr" \
class="gmail_attr">On Thu, Jan 30, 2020 at 10:19 AM Manesh T via Snort-sigs &lt;<a \
href="mailto:snort-sigs@lists.snort.org">snort-sigs@lists.snort.org</a>&gt; \
wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px \
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div \
class="gmail_default" \
style="font-family:georgia,serif;font-size:small;color:rgb(0,0,255)"><div \
class="gmail_default" \
style="color:rgb(34,34,34);font-family:Arial,Helvetica,sans-serif"><font \
color="#000000" face="verdana, sans-serif">Dear All,</font></div><div \
class="gmail_default" \
style="color:rgb(34,34,34);font-family:Arial,Helvetica,sans-serif"><font \
color="#000000" face="verdana, sans-serif">Greetings.<br>I would like to see the \
rules for WPA2 KRACK Vulnerabilities created by Snort.<br>The corresponding CVE is \
2017-13077.<br>The signature ID is 1-44640.<br><br>I would be thankful to you if you \
could help to identify or see or download the rules created for the aforementioned \
vulnerabilities.<br><br>I have installed Snort&#39;s latest version and latest rule \
update in Windows.<br><br>Your help will greatly support my research \
works.<br><br>Could you anybody help me.</font><br></div><div class="gmail_default" \
style="color:rgb(34,34,34);font-family:Arial,Helvetica,sans-serif"><font \
color="#000000" face="verdana, sans-serif"><br></font></div><div \
class="gmail_default" \
style="color:rgb(34,34,34);font-family:Arial,Helvetica,sans-serif"><font \
color="#000000" face="verdana, sans-serif">Thank you</font></div><font \
color="#888888" style="font-family:Arial,Helvetica,sans-serif"><div \
class="gmail_default"><font color="#000000" face="verdana, \
sans-serif">Manesh</font></div></font></div></div> \
_______________________________________________<br> Snort-sigs mailing list<br>
<a href="mailto:Snort-sigs@lists.snort.org" \
target="_blank">Snort-sigs@lists.snort.org</a><br> <a \
href="https://lists.snort.org/mailman/listinfo/snort-sigs" rel="noreferrer" \
target="_blank">https://lists.snort.org/mailman/listinfo/snort-sigs</a><br> <br>
Please visit <a href="http://blog.snort.org" rel="noreferrer" \
target="_blank">http://blog.snort.org</a> for the latest news about Snort!<br> <br>
Please follow these rules: <a \
href="https://snort.org/faq/what-is-the-mailing-list-etiquette" rel="noreferrer" \
target="_blank">https://snort.org/faq/what-is-the-mailing-list-etiquette</a><br> <br>
Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up \
to date to catch the most &lt;a href=&quot; <a \
href="https://snort.org/downloads/#rule-downloads" rel="noreferrer" \
target="_blank">https://snort.org/downloads/#rule-downloads</a>&quot;&gt;emerging \
threats&lt;/a&gt;!<br> </blockquote></div>



_______________________________________________
Snort-sigs mailing list
Snort-sigs@lists.snort.org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up \
to date to catch the most <a href=" \
https://snort.org/downloads/#rule-downloads">emerging threats</a>!



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic