SNORT rule for detecting/preventing unauthorized VPN or encrypted traffic

Here’s my not so theoretical scenario: A day-one Trojan horse attack where the attacker sets up a secure connection back to himself using a well known trusted port, such as 80 21 443. Or for instance, if a malicious user takes advantage of… Continue reading SNORT rule for detecting/preventing unauthorized VPN or encrypted traffic