491.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 64 行
TXT
64 行
Rule: --Sid:491--Summary:This event is generated when a failed attempt to login to an FTP serveris detected.--Impact:Unknown. Multiple events may indicate an attempt to enumerate accountsand passwords using brute force methodology.--Detailed Information:This event is generated when a failed attempt to login to an FTP serveris detected.Multiple events may indicate an attempt to enumerate accountsand passwords using brute force methodology.--Affected Systems: All FTP Servers --Attack Scenarios:--Ease of Attack:Simple.--False Positives:None Known--False Negatives:None Known--Corrective Action:Check FTP logs for access attempts.Disallow FTP access from sources external to the protected network.Consider using Secure Shell as a replacement for FTP services.--Contributors:Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:RFC:http://www.faqs.org/rfcs/rfc959.html--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?