⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1504.txt

📁 This is the snapshot of Snot Latest Rules
💻 TXT
字号:
Rule:  --Sid:1504--Summary:This event is generated when an attempt is made to access AFS from a source outside the protected network.--Impact:Serious. Unauthorized file access.--Detailed Information:The Andrew File System (AFS) is a popular networked file system much like NFS, it is often used in the enterprise or by educational institutions. AFS utilises an Access Control List (ACL) to determine which hosts or networks are allowed to connect to the resources in the system. Misconfigured ACLs may allow an attacker to gain critical information.--Attack Scenarios:Badly configured ACL's allow an attacker that has access to the AFS service to read critical files and even upload files.--Ease of Attack:Simple. No exploit code is needed.--False Positives:None known--False Negatives:None known--Corrective Action:Use a packet filtering firewall to prevent unknown hosts from accessing the AFS service--Contributors:Snort documentation contributed by Ueli Kistler, <u.kistler@engagesecurity.com>Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -