⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3456.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:3456-- Summary: This event is generated when the user "root" logs in to a MySQL database from an external source.-- Impact: Serious. An attacker may have gained superuser access to the system.--Detailed Information:This event is generated when someone using the name "root" logs in to a MySQL database.The 'root' user may have access to all databases on the system, with full privileges to add users, delete data, add information, etc. This connection can either be a legitimate telnet connection or the result of spawning a remote shell as a consequence of a successful network exploit. --Attack Scenarios: Simple. The user logs in with the username 'root', full access is then granted to that user for all databases served by the MySQL daemon. The attacker may then continue to gain sensitive information from any database in the system.-- Ease of Attack: Simple. This may be post-attack behavior and can be indicative of the successful exploitation of a vulnerable system.-- False Positives: This event may be generated by a database administrator logging in as the root user from a location outside the protected network.--False Negatives:None Known-- Corrective Action: Ensure that this event was not generated by a legitimate session then investigate the server for signs of compromiseLook for other events generated by the same IP addresses.--Contributors: Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -