readme.dns

来自「This is the snapshot of Snot Latest Rule」· DNS 代码 · 共 55 行

DNS
55
字号
DNS---Steven Sturges <ssturges@sourcefire.com>Documentation last update 2006-08-25== Overview ==The DNS preprocessor decodes DNS Responses and can detect thefollowing exploits: DNS Client RData Overflow, Obsolete RecordTypes, and Experimental Record Types.DNS looks are DNS Response traffic over UDP and TCP and it requiresStream preprocessor to be enabled for TCP decoding.== Configuration ==By default, all alerts are disabled and the preprocessor checks trafficon port 53.  The available configuration options are described below:* ports { port[, port] .. }*This option specifies the source ports that the DNS preprocessor shouldinspect traffic.* enable_obsolete_types *Alert on Obsolete (per RFC 1035) Record Types* enable_experimental_types *Alert on Experimental (per RFC 1035) Record Types* enable_rdata_overflow *Check for DNS Client RData Overflow== Example/Default Configuration ==Looks for traffic on DNS server port 53.  Check for the DNS Client RDataoverflow vulnerability.  Do not alert on obsolete or experimental RDatarecord types.preprocessor dns: ports { 53 } \                  enable_rdata_overflow== Conclusion ==The DNS preprocessor does nothing if none of the 3 vulnerabilitiesit checks for are enabled.  It will not operate on TCP sessionspicked up midstream, and it will cease operation on a session if itloses state because of missing data (dropped packets).

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?