631.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 64 行

TXT
64
字号
Rule:--Sid:631--Summary:This event is generated when an external user scans an internal SMTPserver using Network Associates' Cybercop vulnerability scanner. --Impact:Information gathering. --Detailed Information:Cybercop Scanner is scanning software that searches for systemvulnerabilities. As one of its scanning procedures, it sends an EHLOcommand to SMTP server ports to determine if the SMTP server will returna list of remote commands that it accepts.   --Affected Systems:Any SMTP server that returns a list of acceptable commands for remote mailers.--Attack Scenarios:An attacker may run Cybercop Scanner against SMTP servers in order todetermine vulnerabilities that can later be exploited.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure that your SMTP server does not provide more information than isnecessary when it receives an EHLO request.--Contributors:Original rule writer unknownModified by Brian Caswell <bmc@sourcefire.com>Sourcefire Vulnerability Research TeamSourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:General Cybercop information:http://www.securityfocus.com/products/126--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?