📄 1901.txt
字号:
Rule:--Sid:1901--Summary:This event is generated when a known response to a sucessful attack isdetected.--Impact:Information gathering and system integrity compromise. Possible unauthorizedadministrative access to the server or application. Possible executionof arbitrary code of the attackers choosing in some cases.--Detailed Information:This event is generated when a known response to a sucessful attack isdetected. Some applications do not perform stringent checks when validatingthe credentials of a client host connecting to the services offered on ahost server. This can lead to unauthorized access and possibly escalatedprivileges to that of the administrator. Data stored on the machine can becompromised and trust relationships between the victim server and otherhosts can be exploited by the attacker.Events generated by rules in attack-responses.rules may indicate that anattack against a host has been sucessful.--Affected Systems: Any vulnerable host.--Attack Scenarios:An attacker can access an authentication mechanism and supply his/herown credentials to gain access. An attacker might also exploit aweakness in a particular application or piece of software that willpresent the opportunity to gain access to the host.--Ease of Attack:Simple. Many exploits exist for various systems and software.--False Positives:None known.--False Negatives:None known.--Corrective Action:Ensure the system is using an up to date version of the software and hashad all vendor supplied patches applied.Care should be taken to investigate the source of the event. Check forsigns of system compromise in log files. Check for listening services onhigh ports.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -