⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1228.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:1228--Summary:A nmap XMAS scan was detected.--Impact:System reconnaissance that may include open/closed/firewalled ports,ACLs.--Detailed Information:Nmap sets the URG PSH and FIN bits as part of it's XMAS scan.Typically, a closed port will respond with an ACK RST, whereas an openport may not respond at all.  However, this varies from machine tomachine, and also depends on what (if any) filtering policies are inplace between the hosts in question.--Affected Systems:	All systems--Attack Scenarios:As part of information gathering that may occur before a morededicated attack, an attacker may choose to use nmap's XMAS scan todetermine open/closed ports.__Ease of Attack:Trivial.  Nmap is freely available to anyone who wishes to use it.The only requirement is root/elevated privledges (the XMAS scanrequires this) and a lack of proper filtering between the twomachines.--False Positives:None Known. The FIN PSH and URG flags should never be seen togetherin normal TCP traffic.--False Negatives:None Known--Corrective Action:Determine what ports may have responded as being open, and what cluesthat may give an attacker relating to potential attacks.Additionally, investigate the use of proper ingress/egress filtering.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org>-- Additional References:SANS:http://rr.sans.org/firewall/egress.php--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -