"info":"OSINT - Windows SMBv3 Denial of Service Proof of Concept (0 Day Exploit)",
"publish_timestamp":"1486156232",
"published":true,
"threat_level_id":"3",
"timestamp":"1486156219",
"uuid":"5894f12f-709c-4502-a896-7dbf02de0b81",
"Orgc":{
"name":"CIRCL",
"uuid":"55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag":[
{
"colour":"#ffffff",
"local":"0",
"name":"tlp:white",
"relationship_type":""
}
],
"Attribute":[
{
"category":"Network activity",
"comment":"Based on this understanding of the exploit (please let me know if I didn't get it right or missed something), I wrote a simple snort signature that looks for Tree Connect messages that exceed 1000 bytes in size. Use this at your own risk. It is in \"works for me\" state:",