⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 793.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:793--Summary:This event is generated when an internal mail server sends an e-mail out of the network that may contain a Visual Basic Script (VBS) attachment. --Impact:Malicious code infection.  This event may indicate that an internal host may be infected with some kind of malicious code.--Detailed Information:An outbound e-mail message that contains an attachment with a file name ending in ".vbs" may indicate that an internal host has been infected by some kind of malicious code.  A ".vbs" extension typically means that an attachment file is a Visual Basic Script.  A VBS attachment may contain executable code for a worm, virus, or trojan.--Affected Systems:Microsoft Windows hosts.--Attack Scenarios:Malicious code may be spread by e-mail containing attachments with files ending in ".vbs".--Ease of Attack:Simple--False Positives:This alert will be triggered if e-mail is sent containing a legitimate VBS attachment.--False Negatives:None known.--Corrective Action:Make sure that the suspected infected host has the most current anti-virus software.Run a virus scan on the suspected infected host.Configure your mail server to block attachments that contain executable code, such as those with extensions of ".vbs", ".exe", etc.--Contributors:Original rule writer unknown.Documented by Steven Alexander<alexander.s@mccd.edu>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -