This question presents a fictitious security vulnerability in a range of lasers printers. The question requires that you develop SNORT IDS rules to detect exploits of this fictitious vulnerability. All information regarding this vulnerability is fabricated to give the illusion of a real security threat.
With over 15 Years Experience in IT Infrastructure and Security Operations, Engineering, and Management, the creation of Snort Rules is achievabke in the time and budget presented.
Have gone through with the details, and could give you the snort rules on time. please revert back to me.
----------------------------------------------------
Regards
Kitesoftware
We are ec-council certified ethical hackers and ec-council certified system administrators. We know about snort rules and so can help you in this project. please be free to contact us.