📄 1122.txt
字号:
Rule:Sid:--1122Summary:--This event is generated when an attempt is made to retrieve a protectedsystem file on a host via a web request.--Impact:Information Gathering.--Detailed Information:The passwd file usually found in the /etc/ directory on UNIX basedsystems, contains login information for users of a host. If shadowpassword files are not being used, an attacker could obtain valid logininformation for the system by using widely available password crackingtools on the file.The file may also be used to garner information that may be used inbrute force password guessing attacks against the host.--Affected Systems: All UNIX based systems running a Web Server. --Attack Scenarios:The attacker can make a standard HTTP request that contains '/etc/passwd'in the URI.--Ease of Attack:Simple HTTP request.--False Positives:None Known--False Negatives:None Known--Corrective Action:Webservers should not be allowed to view or execute files and binaries outside of it's designated web root or cgi-bin. This file may also be requested on a command line should the attacker gain access to the machine. Making the file read only by the superuser on the system will disallow viewing of the file by other users.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -