⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gen-msg.map

📁 This is the snapshot of Snot Latest Rules
💻 MAP
字号:
# $Id: gen-msg.map,v 1.39.4.1 2007/09/19 15:09:35 mwatchinski Exp $# GENERATORS -> msg map# Format: generatorid || alertid || MSG1 || 1 || snort general alert2 || 1 || tag: Tagged Packet3 || 1 || snort dynamic alert100 || 1 || spp_portscan: Portscan Detected100 || 2 || spp_portscan: Portscan Status100 || 3 || spp_portscan: Portscan Ended101 || 1 || spp_minfrag: minfrag alert102 || 1 || http_decode: Unicode Attack102 || 2 || http_decode: CGI NULL Byte Attack102 || 3 || http_decode: large method attempted102 || 4 || http_decode: missing uri102 || 5 || http_decode: double encoding detected102 || 6 || http_decode: illegal hex values detected102 || 7 || http_decode: overlong character detected103 || 1 || spp_defrag: Fragmentation Overflow Detected103 || 2 || spp_defrag: Stale Fragments Discarded104 || 1 || spp_anomsensor: SPADE Anomaly Threshold Exceeded104 || 2 || spp_anomsensor: SPADE Anomaly Threshold Adjusted105 || 1 || spp_bo: Back Orifice Traffic Detected105 || 2 || spp_bo: Back Orifice Client Traffic Detected105 || 3 || spp_bo: Back Orifice Server Traffic Detected105 || 4 || spp_bo: Back Orifice Snort Buffer Attack106 || 1 || spp_rpc_decode: Fragmented RPC Records106 || 2 || spp_rpc_decode: Multiple Records in one packet106 || 3 || spp_rpc_decode: Large RPC Record Fragment106 || 4 || spp_rpc_decode: Incomplete RPC segment106 || 5 || spp_rpc_decode: Zero-length RPC Fragment110 || 1 || spp_unidecode: CGI NULL Attack110 || 2 || spp_unidecode: Directory Traversal110 || 3 || spp_unidecode: Unknown Mapping110 || 4 || spp_unidecode: Invalid Mapping111 || 1 || spp_stream4: Stealth Activity Detected111 || 2 || spp_stream4: Evasive Reset Packet111 || 3 || spp_stream4: Retransmission111 || 4 || spp_stream4: Window Violation111 || 5 || spp_stream4: Data on SYN Packet111 || 6 || spp_stream4: Full XMAS Stealth Scan111 || 7 || spp_stream4: SAPU Stealth Scan111 || 8 || spp_stream4: FIN Stealth Scan 111 || 9 || spp_stream4: NULL Stealth Scan111 || 10 || spp_stream4: NMAP XMAS Stealth Scan111 || 11 || spp_stream4: VECNA Stealth Scan111 || 12 || spp_stream4: NMAP Fingerprint Stateful Detection111 || 13 || spp_stream4: SYN FIN Stealth Scan111 || 14 || spp_stream4: TCP forward overlap detected111 || 15 || spp_stream4: TTL Evasion attempt111 || 16 || spp_stream4: Evasive retransmitited data attempt111 || 17 || spp_stream4: Evasive retransmitited data with the data split attempt111 || 18 || spp_stream4: Multiple acked111 || 19 || spp_stream4: Shifting to Emegency Session Mode111 || 20 || spp_stream4: Shifting to Suspend Mode111 || 21 || spp_stream4: TCP Timestamp option has value of zero111 || 22 || spp_stream4: Too many overlapping TCP packets111 || 23 || spp_stream4: Packet in established TCP stream missing ACK111 || 24 || spp_stream4: Evasive FIN Packet111 || 25 || spp_stream4: SYN on established112 || 1 || spp_arpspoof: Directed ARP Request112 || 2 || spp_arpspoof: Etherframe ARP Mismatch SRC112 || 3 || spp_arpspoof: Etherframe ARP Mismatch DST112 || 4 || spp_arpspoof: ARP Cache Overwrite Attack113 || 1 || spp_frag2: Oversized Frag113 || 2 || spp_frag2: Teardrop/Fragmentation Overlap Attack113 || 3 || spp_frag2: TTL evasion detected113 || 4 || spp_frag2: overlap detected113 || 5 || spp_frag2: Duplicate first fragments113 || 6 || spp_frag2: memcap exceeded113 || 7 || spp_frag2: Out of order fragments113 || 8 || spp_frag2: IP Options on Fragmented Packet113 || 9 || spp_frag2: Shifting to Emegency Session Mode113 || 10 || spp_frag2: Shifting to Suspend Mode114 || 1 || spp_fnord: Possible Mutated GENERIC NOP Sled detected114 || 2 || spp_fnord: Possible Mutated IA32 NOP Sled detected114 || 3 || spp_fnord: Possible Mutated HPPA NOP Sled detected114 || 4 || spp_fnord: Possible Mutated SPARC NOP Sled detected115 || 1 || spp_asn1: Indefinite ASN.1 length encoding115 || 2 || spp_asn1: Invalid ASN.1 length encoding115 || 3 || spp_asn1: ASN.1 oversized item, possible overflow115 || 4 || spp_asn1: ASN.1 spec violation, possible overflow115 || 5 || spp_asn1: ASN.1 Attack: Datum length > packet length116 || 1 || snort_decoder: Not IPv4 datagram!116 || 2 || snort_decoder: WARNING: hlen < IP_HEADER_LEN!116 || 3 || snort_decoder: WARNING: IP dgm len < IP Hdr len!116 || 4 || snort_decoder: Bad IPv4 Options116 || 5 || snort_decoder: Truncated IPv4 Options116 || 6 || snort_decoder: WARNING: hlen > IP_HEADER_LEN!116 || 45 || snort_decoder: TCP packet len is smaller than 20 bytes!116 || 46 || snort_decoder: TCP Data Offset is less than 5!116 || 47 || snort_decoder: TCP Data Offset is longer than payload!116 || 54 || snort_decoder: Tcp Options found with bad lengths116 || 55 || snort_decoder: Truncated Tcp Options116 || 56 || snort_decoder: T/TCP Detected116 || 57 || snort_decoder: Obsolete TCP options116 || 58 || snort_decoder: Experimental TCP options116 || 59 || snort_decoder: TCP Window Scale Option Scale Invalid (> 14)116 || 95 || snort_decoder: Truncated UDP Header!116 || 96 || snort_decoder: Invalid UDP header, length field < 8116 || 97 || snort_decoder: Short UDP packet, length field > payload length116 || 98 || snort_decoder: Long UDP packet, length field < payload length116 || 105 || snort_decoder: ICMP Header Truncated!116 || 106 || snort_decoder: ICMP Timestamp Header Truncated!116 || 107 || snort_decoder: ICMP Address Header Truncated!116 || 108 || snort_decoder: Unknown Datagram decoding problem!116 || 109 || snort_decoder: Truncated ARP Packet!116 || 110 || snort_decoder: Truncated EAP Header!116 || 111 || snort_decoder: EAP Key Truncated!116 || 112 || snort_decoder: EAP Header Truncated!116 || 120 || snort_decoder: WARNING: Bad PPPOE frame detected!116 || 130 || snort_decoder: WARNING: Bad VLAN Frame!116 || 131 || snort_decoder: WARNING: Bad LLC header!116 || 132 || snort_decoder: WARNING: Bad Extra LLC Info!116 || 133 || snort_decoder: WARNING: Bad 802.11 LLC header!116 || 134 || snort_decoder: WARNING: Bad 802.11 Extra LLC Info!116 || 140 || snort_decoder: WARNING: Bad Token Ring Header!116 || 141 || snort_decoder: WARNING: Bad Token Ring ETHLLC Header!116 || 142 || snort_decoder: WARNING: Bad Token Ring MRLEN Header!116 || 143 || snort_decoder: WARNING: Bad Token Ring MR Header!116 || 150 || snort_decoder: Bad Traffic Loopback IP!116 || 151 || snort_decoder: Bad Traffic Same Src/Dst IP!116 || 160 || snort_decoder: WARNING: GRE header length > payload length116 || 161 || snort_decoder: WARNING: Multiple GRE encapsulations in packet116 || 250 || snort_decoder: WARNING: ICMP Original IP Header Truncated!"116 || 251 || snort_decoder: WARNING: ICMP Original IP Header Not IPv4!"116 || 252 || snort_decoder: WARNING: ICMP Original Datagram Length < Original IP Header Length!"116 || 253 || snort_decoder: WARNING: ICMP Original IP Payload < 64 bits!"116 || 254 || snort_decoder: WARNING: ICMP Origianl IP Payload > 576 bytes!"116 || 255 || snort_decoder: WARNING: ICMP Original IP Fragmented and Offset Not 0!"117 || 1 || spp_portscan2: Portscan detected!118 || 1 || spp_conversation: Bad IP protocol!119 || 1 || http_inspect: ASCII ENCODING119 || 2 || http_inspect: DOUBLE DECODING ATTACK119 || 3 || http_inspect: U ENCODING119 || 4 || http_inspect: BARE BYTE UNICODE ENCODING119 || 5 || http_inspect: BASE36 ENCODING119 || 6 || http_inspect: UTF-8 ENCODING119 || 7 || http_inspect: IIS UNICODE CODEPOINT ENCODING119 || 8 || http_inspect: MULTI_SLASH ENCODING119 || 9 || http_inspect: IIS BACKSLASH EVASION119 || 10 || http_inspect: SELF DIRECTORY TRAVERSAL119 || 11 || http_inspect: DIRECTORY TRAVERSAL119 || 12 || http_inspect: APACHE WHITESPACE (TAB)119 || 13 || http_inspect: NON-RFC HTTP DELIMITER119 || 14 || http_inspect: NON-RFC DEFINED CHAR119 || 15 || http_inspect: OVERSIZE REQUEST-URI DIRECTORY119 || 16 || http_inspect: OVERSIZE CHUNK ENCODING119 || 17 || http_inspect: UNAUTHORIZED PROXY USE DETECTED119 || 18 || http_inspect: WEBROOT DIRECTORY TRAVERSAL120 || 1 || http_inspect: ANOMALOUS HTTP SERVER ON UNDEFINED HTTP PORT121 || 1 || flow-portscan: Fixed Scale Scanner Limit Exceeded121 || 2 || flow-portscan: Sliding Scale Scanner Limit Exceeded121 || 3 || flow-portscan: Fixed Scale Talker Limit Exceeded121 || 4 || flow-portscan: Sliding Scale Talker Limit Exceeded122 || 1 || portscan: TCP Portscan122 || 2 || portscan: TCP Decoy Portscan122 || 3 || portscan: TCP Portsweep122 || 4 || portscan: TCP Distributed Portscan122 || 5 || portscan: TCP Filtered Portscan122 || 6 || portscan: TCP Filtered Decoy Portscan122 || 7 || portscan: TCP Filtered Portsweep122 || 8 || portscan: TCP Filtered Distributed Portscan122 || 9 || portscan: IP Protocol Scan122 || 10 || portscan: IP Decoy Protocol Scan122 || 11 || portscan: IP Protocol Sweep122 || 12 || portscan: IP Distributed Protocol Scan122 || 13 || portscan: IP Filtered Protocol Scan122 || 14 || portscan: IP Filtered Decoy Protocol Scan122 || 15 || portscan: IP Filtered Protocol Sweep122 || 16 || portscan: IP Filtered Distributed Protocol Scan122 || 17 || portscan: UDP Portscan122 || 18 || portscan: UDP Decoy Portscan122 || 19 || portscan: UDP Portsweep122 || 20 || portscan: UDP Distributed Portscan122 || 21 || portscan: UDP Filtered Portscan122 || 22 || portscan: UDP Filtered Decoy Portscan122 || 23 || portscan: UDP Filtered Portsweep122 || 24 || portscan: UDP Filtered Distributed Portscan122 || 25 || portscan: ICMP Sweep122 || 26 || portscan: ICMP Filtered Sweep122 || 27 || portscan: Open Port123 || 1 || frag3: IP Options on fragmented packet123 || 2 || frag3: Teardrop attack123 || 3 || frag3: Short fragment, possible DoS attempt123 || 4 || frag3: Fragment packet ends after defragmented packet123 || 5 || frag3: Zero-byte fragment123 || 6 || frag3: Bad fragment size, packet size is negative123 || 7 || frag3: Bad fragment size, packet size is greater than 65536123 || 8 || frag3: Fragmentation overlap124 || 1 || smtp: Attempted command buffer overflow124 || 2 || smtp: Attempted data header buffer overflow124 || 3 || smtp: Attempted response buffer overflow124 || 4 || smtp: Attempted specific command buffer overflow124 || 5 || smtp: Unknown command124 || 6 || smtp: Illegal command124 || 7 || smtp: Attempted header name buffer overflow125 || 1 || ftp_pp: Telnet command on FTP command channel125 || 2 || ftp_pp: Invalid FTP command125 || 3 || ftp_pp: FTP parameter length overflow125 || 4 || ftp_pp: FTP malformed parameter125 || 5 || ftp_pp: Possible string format attempt in FTP command/parameter125 || 6 || ftp_pp: FTP response length overflow125 || 7 || ftp_pp: FTP command channel encrypted125 || 8 || ftp_pp: FTP bounce attack125 || 9 || ftp_pp: Evasive Telnet command on FTP command channel126 || 1 || telnet_pp: Telnet consecutive AYT overflow126 || 2 || telnet_pp: Telnet data encrypted126 || 3 || telnet_pp: Subnegotiation Begin without matching Subnegotiation End128 || 1 || ssh: Gobbles exploit 128 || 2 || ssh: SSH1 CRC32 exploit 128 || 3 || ssh: Server version string overflow128 || 4 || ssh: Protocol mismatch128 || 5 || ssh: Bad message direction128 || 6 || ssh: Payload size incorrect for the given payload128 || 7 || ssh: Failed to detect SSH version string129 || 1 || stream5: SYN on established session129 || 2 || stream5: Data on SYN packet129 || 3 || stream5: Data sent on stream not accepting data129 || 4 || stream5: TCP Timestamp is outside of PAWS window129 || 5 || stream5: Bad segment, overlap adjusted size less than/equal 0129 || 6 || stream5: Window size (after scaling) larger than policy allows129 || 7 || stream5: Limit on number of overlapping TCP packets reached129 || 8 || stream5: Data sent on stream after TCP Reset129 || 9 || stream5: TCP Client possibly hijacked, different Ethernet Address129 || 10 || stream5: TCP Server possibly hijacked, different Ethernet Address130 || 1 || dcerpc: Maximum memory usage reached131 || 1 || dns: Obsolete DNS RData Type131 || 2 || dns: Experimental DNS RData Type131 || 3 || dns: Client RData TXT Overflow

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -