📄 543.txt
字号:
Rule: --Sid:543--Summary:This event is generated when an attempt is made to store a file named"1mb" on an ftp server.--Impact:Possible abuse ftp behavior by hordes of warez sites, and theexistance of (potentially) illegal files/software on an ftp server.--Detailed Information:Warez sites have been known to name "warez" files by their size. Largefiles are split into smaller, more manageable chunks, and allow warezsites to store large files on ftp sites in a semi-organized manner.--Affected Systems: All FTP servers--Attack Scenarios:As part of an attempt to store elite warez on an ftp server, anattacker named the file "1mb" to indicate it's size. This file islikely part of an archive that represents a larger, most likelyillegal copy of media.--Ease of Attack:Simple. Exploit software is not required--False Positives:If a legitimate user has a legitimate file named "1mb", this rule maygenerate an event.--False Negatives:This will detect only files named 1mb. If a warez site decides tostart naming their files in a different way this rule will not generatean event.--Corrective Action:Inspect the ftp server for a file named 1mb. If it exists, determineif the file is legitimate, or if it was deposited by someone attemptingto use the server to distribute non-legitimate files.Furthermore, evaluate the need for ftp write access.--Contributors:Original rule writer unknownSnort documentation contributed by Jon Hart <warchild@spoofed.org>Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -