⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 221.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:221--Summary:This event is generated when a host attempts to communicate with a Tribal Flood Network (TFN) DDoS client.--Impact:Reconnaissance.  If the listed source IP is in your network, it may be a TFN attacker or it may be probing for another attacker's TFN clients.  If the listed destination IP is in your network, it may be a TFN client. --Detailed Information:The TFN DDoS uses a tiered structure of compromised hosts to coordinate and participate in a distributed denial of service attack. At the highest level, attackers communicate with clients to launch attacks. An attacker may probe for TFN clients using an ICMP echo request with an ICMP identification number of 678 and a string of "1234" in the payload. --Affected Systems:Any TFN compromised host.--Attack Scenarios:After a host becomes a TFN client, an attacker may attempt to communicate with it.--Ease of Attack:Simple. TFN code is freely available.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Perform proper forensic analysis on the suspected compromised host to discover the means of compromise.Rebuild a confirmed compromised host.Use a packet-filtering firewall to block inappropriate traffic to the network to prevent hosts from being compromised.--Contributors:Original rule writer Stefan Puffer <drsuse@drsuse.org>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:CVE:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0138Arachnids:http://www.whitehats.com/info/IDS443--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -