📄 readme.dns
字号:
DNS---Steven Sturges <ssturges@sourcefire.com>Documentation last update 2006-08-25== Overview ==The DNS preprocessor decodes DNS Responses and can detect thefollowing exploits: DNS Client RData Overflow, Obsolete RecordTypes, and Experimental Record Types.DNS looks are DNS Response traffic over UDP and TCP and it requiresStream preprocessor to be enabled for TCP decoding.== Configuration ==By default, all alerts are disabled and the preprocessor checks trafficon port 53. The available configuration options are described below:* ports { port[, port] .. }*This option specifies the source ports that the DNS preprocessor shouldinspect traffic.* enable_obsolete_types *Alert on Obsolete (per RFC 1035) Record Types* enable_experimental_types *Alert on Experimental (per RFC 1035) Record Types* enable_rdata_overflow *Check for DNS Client RData Overflow== Example/Default Configuration ==Looks for traffic on DNS server port 53. Check for the DNS Client RDataoverflow vulnerability. Do not alert on obsolete or experimental RDatarecord types.preprocessor dns: ports { 53 } \ enable_rdata_overflow== Conclusion ==The DNS preprocessor does nothing if none of the 3 vulnerabilitiesit checks for are enabled. It will not operate on TCP sessionspicked up midstream, and it will cease operation on a session if itloses state because of missing data (dropped packets).
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -