@da_667@infosec.exchange
Hey there,
Yesterday I posted up a write-up on how to archive exploit write-ups and proof of concept code, and how to turn those blog posts and PoCs into Snort rules, and Suricata rules, and the differences between the two rule engines, their syntax, and why we do things what we do when creating rules for the ET ruleset:
https://www.totes-legit-notmalware.site/home/detection-exercise-d-link-dir-513-cves-2025-8184-8169-and-8168
Sometimes my blogposts on my personal blog are a little raw and a little vulgar. Sometimes you might want to share this stuff with co-workers or your SOC's chat channel and might not care for the foul language, so I create a more worksafe version that I put on the emerging threats community forum.
Just letting y'all know, that I finished the worksafe re-write of the blog post, and it's over here:
https://community.emergingthreats.net/t/detection-exercise-d-link-dir-513-cves-2025-8184-8169-and-8168/2944
Enjoy your Saturday