120-1.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 66 行

TXT
66
字号
Rule: --Sid: 120-1-- Summary: This event is generated when the pre-processor http_inspectdetects network traffic that may constitute an attack.-- Impact: Unknown.--Detailed Information:This event is generated when the http_inspect pre-processor detects thepresence of a web server running on a non-defined port.Web server ports are defined in snort.conf as the variable $HTTP_PORTSand also in the section for http_inspect. When a server is accessed on aport not defined in snort.conf the presence of web traffic generates anevent. This may indicate the presence of an unauthorized web server.--Affected Systems:	All.--Attack Scenarios: A web server may be used to transfer files from inside the protectednetwork to unauthorized recipients on the outside.-- Ease of Attack: Simple.-- False Positives:None Known.--False Negatives:None Known.-- Corrective Action:Check the target host for signs of compromise.Apply any appropriate vendor supplied patches.--Contributors: Daniel Roelker <droelker@sourcefire.com>Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:HTTP IDS Evasions Revisited - Daniel Roelkerhttp://docs.idsresearch.org/http_ids_evasions.pdf--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?