Focus on IDS
Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Exploit-based signature is dead, or not?
Mar 16 2009 08:27PM
Addepalli Srini-B22160 (saddepalli freescale com)
Exploit code can be used to figure out the kind of vulnerability that application/system has. Hence the signatures developed once the vulnerability is understood can be said that they are vulnerability based signatures as per your terminology. But there are exceptions though.
If the vulner...
[ more ]
Copyright 2010, SecurityFocus