Well, during my stay at the SecTor conference I attended a couple of
talks about malware to understand this subject better and it seems
that malware IS DOING user agent detection, but it's made (at least
for what I could see) using JavaScript code. This means that sending a
different UA header won'
Andri,
On Mon, Oct 7, 2013 at 9:54 PM, Andri Herumurti wrote:
> Hi Andres,
>
> I think no problem as long as the ruleset is open source.
>
> So when we will make it happen ?
For now it's just an idea, I don't have a plan to implement it. I also
want to collect more information on which ruleset i
Hi Andres,
I think no problem as long as the ruleset is open source.
So when we will make it happen ?
Regards
Andri
> On 6 Okt 2013, at 18.58, Andres Riancho wrote:
>
> Maybe the focus should be moved away from the detection engines
> (snort, suricata) and into the rules provider(s)?
>
> htt
Maybe the focus should be moved away from the detection engines
(snort, suricata) and into the rules provider(s)?
http://www.emergingthreats.net/open-source/
On Sun, Oct 6, 2013 at 8:53 AM, Andres Riancho wrote:
> Andri,
>
> Good question, actually I didn't even consider Suricata because I
>
Andri,
Good question, actually I didn't even consider Suricata because I
was unaware of it's existance :( So, after reading the suricata
website for some minutes it seems that their rule format is *very
similar* (the same?) as the one from snort, which could make things
easier if we want to su
Hi Andres,
how if use Suricata than Snort ?
here is the comparison : http://wiki.aanval.com/wiki/Snort_vs_Suricata
Regards,
Andri
From: Andres Riancho
To: "w3af-users@lists.sourceforge.net" ;
"w3af-deve...@lists.sourceforge.net"
Sent: Sunday, October 6, 2