Skip to content
Discussion options

You must be logged in to vote

Besides the Zeek script in the article, another option might be to leverage the http.dottedquadhost rules that are already in the Emerging Threats NIDS ruleset.

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by dougburks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Ideas
Labels
None yet
2 participants