⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 2041.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:2041--Summary:The Extended Terminal Access Controller Access Control System (XTACACS) is an authentication and authorization protocol derived from  CISCO TACACS. It is used in TCP/IP networks where network servers authenticateclients from a master server.This event is generated when a failed login using XTACACS is observed.--Impact:This may be an intelligence gathering activity or an attempt to access resources controlled by the XTACACS server.Multiple events from this rule may indicate the attempted enumeration ofa valid user account using brute force methodology.--Detailed Information:When a user logs in to a server that uses XTACACS the server then makes a request to a master server to determine the validity of the request. The master server then verifies the login attempt and returns data concerning that user which may include information regarding resources the user is allowed access to in the form of an access list.--Affected Systems:All servers using XTACACS for authentication control.--Attack Scenarios:Regular user login method.--Ease of Attack:Simple--False Positives:This rule may generate an event when a legitimate user supplies anincorrect password or username when logging in to a device.--False Negatives:None Known--Corrective Action:XTACACS servers should only authenticate to known hosts and firewall rules should prevent access to XTACACS enabled servers from outside the local area network.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Network Information Library - Intel:http://www.intel.com/support/si/library/bi0414.htmThe Internet Next Generation Project:http://ing.ctit.utwente.nl/WU5/D5.1/Technology/xtacacs/Xtacacs Home:http://www.netplex-tech.com/software/xtacacsd/--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -