📄 1856.txt
字号:
Rule:--Sid:1856--Summary:This event is generated when activity indicating the presence of avariant of the Stacheldraht DDOS tool is detected.--Impact:Distributed Denial of Service (DDoS) is possible.--Detailed Information:Stracheldraht is a Distributed denial of service tool normally found onSun Solaris machines. It is made up of a Client, handler and agent. Theclients connects to the handler. Handlers can connect with up to 1000agents. Communication between the client and the handler is conductedusing tcp and the communication between the handler and the agent can beeither tcp or icmp_echoreply. This rule detects the message sent fromthe handler to the agent. This message is used to respond to a agentmessage "skillz". The handler will reply with the string "ficken". Thistraffic differs from the traffic described onhttp://staff.washington.edu/dittrich/misc/stacheldraht.analysis becausethe packets have an icmp id of 6667 rather than 667 as noted in the analysis.--Affected Systems: Sun Solaris--Attack Scenarios:The agent can be used to mount a distributed denial of service attack. Italso indicates that a machine is compromised.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:The icmp id along with the keywords may be changed in thesource code which would then evade this rule.--Corrective Action:Disconnect power from the machine and perform forensic analysis on thehard drives.--Contributors:Snort documentation contributed by Ian MacdonaldSourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -