ET HUNTING 302 Redirect to run .mocky .ioSource: et/open
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET HUNTING 302 Redirect to run .mocky .io"; flow:established,to_client; http.stat_code; content:"302"; http.location; content:"https|3a 2f 2f|run.mocky.io/v3/"; fast_pattern; classtype:trojan-activity; sid:2049246; rev:1; metadata:affected_product Any, attack_target Client_Endpoint, created_at 2023_11_16, deployment Perimeter, deployment SSLDecrypt, former_category HUNTING, performance_impact Low, confidence Medium, signature_severity Informational, updated_at 2023_11_16; target:dest_ip;)
Metadata
affected_productAny
attack_targetClient_Endpoint
created_at2023_11_16
deploymentPerimeter
deploymentSSLDecrypt
former_categoryHUNTING
performance_impactLow
confidenceMedium
signature_severityInformational
updated_at2023_11_16