1087.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 56 行

TXT
56
字号
Rule:  Sid:1087--Summary:This event is generated when an attempt is made to evade an IDS in a possible web attack by obfuscating the request with tabs.--Impact:Unknown.--Detailed Information:Some web servers (e.g., some versions of Apache) will interpret tabs as spaces in web requests.  This is used by some tools (e.g., Whisker) in an attempt to evade IDS systems.--Affected Systems:All systems running a web server--Attack Scenarios:An attacker runs an automated tool, like Whisker, against a web server, or runs an attack by hand with a URL similar to:  GET<tab>/<tab>HTML/1.0--Ease of Attack:Simple. Automated tools are available.--False Positives:None Known--False Negatives:None Known--Corrective Action:Examine the packet to see if a web request was being made. Try to determine what the requested item was (e.g., a file or CGI), and determine from the web server's configuration whether it was a threat or not (e.g., whether the requested file or CGI even existed or was vulnerable).--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Alex Kirk <alex.kirk@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?