⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 505.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:505--Summary:This event is generated when an attempt is made to login to a Timbuktu server using an unencrypted link.--Impact:Serious. Unauthorized access to the server.--Detailed information:Looks at the initial hex code of a Timbuktu client login and captures the login and password  combination. This is a poor security practice over the open internet and on untrusted network links. This is a  Timbuktu login going over plaintext to the Timbuktu server.That means that anyone sniffing the wire can now use the login and password used to gain access to  the Timbuktu server.--Affected Systems:	Windows all versions	Mac OS 7.5.3 and later--Attack Scenario:An attacker can use a sniffer to gain the user login credentials and use the information to gain unauthorized access to the machine.--Ease of Attack:Simple.--False Positives:None known--False Negatives:Timbuktu may use a port other than 1417 --Corrective Action:Use Timbuktu over encrypted links or only on local LANs--Contributors:Original Rule Writer UnknownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Jake Babbin --References: --

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -