⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme.ipv6

📁 This is the snapshot of Snot Latest Rules
💻 IPV6
字号:
Overview========Some versions of BSD are vulnerable to an attack that involves sending two fragmented ICMPV6 packets with specific fragmentation flags (see Bugtraq ID22901 or CVE-2007-1365).  Snort will, by default alert if it sees the bothpackets in sequence, or the second packet by itself.  Snort will keep track of multiple simultaneous IPv6 fragmented ICMPv6 sessions,up to a user-configurable timeout or until a session can be confirmed to be safe.Configuration=============This module is enabled by default.  To configure its behavior, add a line tosnort.conf with:        ipv6_frag <option1 arg1>[, <option2 arg2>, ...]Options:       bsd_icmp_frag_alert [on/off]    -       Whether or not to alert on the                                             BSD fragmented ICMPv6 vulnerability    bad_ipv6_frag_alert [on/off]    -       Whether or not to alert if the                                             second packet is seen by itself    frag_timeout [integer]          -       Length of time to track the attack                                            in seconds.  Min 0, max 3600,                                             default 60 (consistent with BSD's                                            internal default).    max_frag_sessions [integer]     -       Total number of possible attacks                                             to track.  Min 0, default 10000.To enable drops in inline mode, use "config enable_decode_drops".

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -