413.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 61 行

TXT
61
字号
Rule:--Sid:413--Summary:This event is generated when a network host generates an ICMP IPV6 Where-Are-You datagram.--Impact:ICMP Type 33 datagrams are not expected network traffic.  Hosts generating ICMP Type 33 datagrams should be investigated for hostile activity.--Detailed Information:ICMP Type 33 is an undocumented extension to RFC 1812 and RFC 792.  Its current use it not defined by an approved RFC.  --Attack Scenarios:None known--Ease of Attack:Numerous tools and scripts can generate this type of ICMP datagram.--False Positives:None known--False Negatives:None known--Corrective Action:Hosts generating ICMP Type 33 datagrams should be investigated for hostile activity.--Contributors:Original rule writer unknownSourcefire Vulnerability Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)--Additional References:None--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?