659.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 55 行
TXT
55 行
Rule:--Sid:659--Summary:This event is generated when a probe is sent to an SMTP server to determine if the decode alias is supported.--Impact:Intelligence gathering activity. This event could be an indication of reconnaissance or an actual attempt to overwrite a sensitive file. If the decode alias is present on the SMTP server, an attacker may use it to overwrite files. --Detailed Information:The decode alias was included to allow email to be sent to a username of decode to process the email content through the uudecode program. A malicious user could attempt to email a uuencoded file that would overwrite an existing sensitive file. --Affected Systems:Older UNIX Sendmail versions (~1990-1996)--Attack Scenarios:An attacker can email a uuencoded file to the decode username to overwrite an existing sensitive file. --Ease of Attack:Simple. Send email containing a uuencoded file to the username decode to overwrite an existing sensitive file.--False Positives:None Known.--False Negatives:None Known.--Corrective Action:Remove decode in /etc/aliases.--Contributors:Original rule written by Max Vision <vision@whitehats.com>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional References:Arachnids:http://www.whitehats.com/info/IDS32--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?