Brutkey

da_667
@da_667@infosec.exchange

Hey there,

Yesterday I posted up a write-up on how to archive exploit write-ups and proof of concept code, and how to turn those blog posts and PoCs into Snort rules, and Suricata rules, and the differences between the two rule engines, their syntax, and why we do things what we do when creating rules for the ET ruleset:

https://www.totes-legit-notmalware.site/home/detection-exercise-d-link-dir-513-cves-2025-8184-8169-and-8168

Sometimes my blogposts on my personal blog are a little raw and a little vulgar. Sometimes you might want to share this stuff with co-workers or your SOC's chat channel and might not care for the foul language, so I create a more
worksafe version that I put on the emerging threats community forum.

Just letting y'all know, that I finished the worksafe re-write of the blog post, and it's over here:

https://community.emergingthreats.net/t/detection-exercise-d-link-dir-513-cves-2025-8184-8169-and-8168/2944

Enjoy your Saturday