119-1.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 64 行

TXT
64
字号
Rule: --Sid: 119-1-- Summary: This event is generated when the pre-processor http_inspectdetects network traffic that may constitute an attack.-- Impact: Unknown. This may be an attempt to evade IDS.--Detailed Information:This event indicates that the http_inspect pre-processor has detectedweb traffic containing coded ascii values.--Affected Systems:	All web servers.--Attack Scenarios: An attacker may try to encode an attack by using the hexadecimalrepresentation of the ascii characters used in an attempt to evadedetection by IDS.-- Ease of Attack: Simple-- False Positives:These encodings can be relatively prevalent in normal web traffic.--False Negatives:None Known.-- Corrective Action:Check the target host for signs of compromise.Apply any appropriate vendor supplied patches.--Contributors:Daniel Roelker <droelker@sourcefire.com> Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:HTTP IDS Evasions Revisited - Daniel Roelkerhttp://docs.idsresearch.org/http_ids_evasions.pdf--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?