264.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 59 行

TXT
59
字号
Rule:--Sid:264--Summary:This event is generated when spurious DNS traffic is detected on the network. --Impact:Ranges from harmless to severe.  A successful corrupted DNS IP and name pairing can range from harmless (if the IP is not used) to severe (if a user is misdirected to a hostile host).--Detailed Information:This event indicates that abnormal DNS traffic has been detected. The implications are varied and careful investigation of the source and destination should be undertaken.This may be the result of an improperly configured DNS server or it may be an indication that an attack against the DNS server is underway.--Affected Systems:Any DNS server.--Attack Scenarios:An attacker can spoof a DNS response to misrepresent an IP to host/name pairing.  The forged host name can direct a user to a potentially hostile host.--Ease of Attack:Simple to Difficult depending on the DNS implementation.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Consider using DNSSEC where appropriate.Keep all DNS software up to date and correctly configured.--Contributors:Original rule writer unknownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Judy Novak <judy.novak@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?