📄 classification.config
字号:
# $Id: classification.config,v 1.4 2001/04/20 12:11:17 fygrave Exp $# The following includes information for prioritizing rules# # Each classification includes a shortname, a description, and a default# priority for that classification.## This allows alerts to be cassified and prioritized. You can specify# what priority each classification has. Any rule can override the default# priority for that rule.## Here are a few example rules:# # alert TCP any any -> any 80 (msg: "EXPLOIT ntpdx overflow"; # dsize: > 128; classtype:attempted-admin; priority:10;## alert TCP any any -> any 25 (msg:"SMTP expn root"; flags:A+; \# content:"expn root"; nocase; classtype:attempted-recon;)## The first rule will set its type to "attempted-admin" and override # the default priority for that type to 10.## The second rule set its type to "attempted-recon" and set its# priority to the default for that type.# ## config classification:shortname,short description,priority#config classification: not-suspicious,Not Suspicious Traffic,0config classification: unknown,Unknown Traffic,1config classification: bad-unknown,Potentially Bad Traffic, 2config classification: attempted-recon,Attempted Information Leak,3config classification: successful-recon-limited,Information Leak,4config classification: successful-recon-largescale,Large Scale Information Leak,5config classification: attempted-dos,Attempted Denial of Service,6config classification: successful-dos,Denial of Service,7config classification: attempted-user,Attempted User Privilege Gain,8config classification: unsuccessful-user,Unsuccessful User Privilege Gain,7config classification: successful-user,Successful User Privilege Gain,9config classification: attempted-admin,Attempted Administrator Privilege Gain,10config classification: successful-admin,Successful Administrator Privilege Gain,11
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -