⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme.dns

📁 This is the snapshot of Snot Latest Rules
💻 DNS
字号:
DNS---Steven Sturges <ssturges@sourcefire.com>Documentation last update 2006-08-25== Overview ==The DNS preprocessor decodes DNS Responses and can detect thefollowing exploits: DNS Client RData Overflow, Obsolete RecordTypes, and Experimental Record Types.DNS looks are DNS Response traffic over UDP and TCP and it requiresStream preprocessor to be enabled for TCP decoding.== Configuration ==By default, all alerts are disabled and the preprocessor checks trafficon port 53.  The available configuration options are described below:* ports { port[, port] .. }*This option specifies the source ports that the DNS preprocessor shouldinspect traffic.* enable_obsolete_types *Alert on Obsolete (per RFC 1035) Record Types* enable_experimental_types *Alert on Experimental (per RFC 1035) Record Types* enable_rdata_overflow *Check for DNS Client RData Overflow== Example/Default Configuration ==Looks for traffic on DNS server port 53.  Check for the DNS Client RDataoverflow vulnerability.  Do not alert on obsolete or experimental RDatarecord types.preprocessor dns: ports { 53 } \                  enable_rdata_overflow== Conclusion ==The DNS preprocessor does nothing if none of the 3 vulnerabilitiesit checks for are enabled.  It will not operate on TCP sessionspicked up midstream, and it will cease operation on a session if itloses state because of missing data (dropped packets).

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -