⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 122-4.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:--Sid:122-4--Summary:This event is generated when the pre-processor sfPortscan detectsnetwork traffic that may constitute an attack. Specifically a tcpdistributed portscan was detected.--Impact:Unknown. This is normally an indicator of possible networkreconnaisance and may be the prelude to a targeted attack against thetargeted systems.--Detailed Information:This event is generated when the sfPortscan pre-processor detectsnetwork traffic that may consititute an attack.A portscan is often the first stage in a targeted attack against asystem. An attacker can use different portscanning techniques and toolsto determine the target host operating system and application versionsrunning on the host to determine the possible attack vectors againstthat host.More information on this event can be found in the individualpre-processor documentation README.sfportscan in the docs directory ofthe snort source. Descriptions of different types of portscanningtechniques can also be found in the same documentation, along withinstructions and examples on how to tune and use the pre-processor.--Affected Systems:	All.--Attack Scenarios:An attacker often uses a portscanning technique to determine operatingsystem type and version and also application versions to determinepossible effective attack vectors that can be used against the targethost.--Ease of Attack:Simple. Many portscanning tools are freely available.--False Positives:While not necessarily a false positive, a security audit or penetrationtest will often employ the use of a portscan in the same way anattacker might use the technique. If this is the case, thepre-processor should be tuned to ignore the audit if so desired.--False Negatives:None Known.--Corrective Action:Check for other events targeting the host.Check the target host for signs of compromise.Apply any appropriate vendor supplied patches as appropriate.--Contributors:Sourcefire Vulnerability Research TeamDaniel Roelker <droelker@sourcefire.com>Marc Norton    <mnorton@sourcefire.com>Jeremy Hewlett <jh@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Nmap:http://www.insecure.org/nmap/Port Scanning Techniques and the Defense Against Them - RogerChristopher, SANS:http://www.sans.org/rr/whitepapers/auditing/70.phpHypervivid Tiger Team - Port-Scanning: A Practical Approachhttp://www.hcsw.org/reading/nmapguide.txt--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -