1446.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 69 行

TXT
69
字号
Rule:--Sid:1446--Summary:This event is generated when an external attacker uses the "vrfy root"command to find the login name or mail alias of the systemadministrator. This may also indicate a vulnerability scan.--Impact:Information gathering. --Detailed Information:An attacker may be able to obtain the email alias or actual emailaddress of root users. This allows the attacker to know which emailaccounts may be more valuable to target, and can be used by spammers oras targets for denial of service attempts.--Affected Systems:Systems running Sendmail.--Attack Scenarios:An attacker uses vrfy root to obtain the name of administrators on theserver. The attacker now knows which accounts have administrativeaccess, and may use this information to focus later attacks.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Disable the vrfy command on your mail server, or update your Sendmailconfiguration file so that Sendmail displays non-sensitive informationwhen it receives a vrfy root request.--Contributors:Original rule written by Brian Caswell <bmc@sourcefire.com>Sourcefire Vulnerability Research TeamSourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:RFC 821:http://www.faqs.org/rfcs/rfc821.htmlSecurity Space:http://www.securityspace.com/smysecure/catid.html?viewsrc=1&id=10249--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?