⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1292.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid: 1292--Summary: This may be post-compromise behavior indicating the use of Windowsdirectory listing tools.--Impact: Varies, an attacker might have gained an ability to execute commands remotely--Detailed Information:This rule is aimed at catching the standard Windows commands forlisting directories. The string "Volume Serial Number" is typically shown infront of the directory listing on Windows NT/2000/XP.  Seeing such aresponse in the HTTP traffic indicates that somebody have managed to"convince" the web server to spawn a shell bound to a web port andhave successfully executed at least one command to list thedirectory. Note that the source address of this signature is actuallythe victim and not the attacker as for the exploit signatures.--Affected Systems:	Microsoft Windows systems--Attack Scenarios:An attacker gains an access to a Windows web server via IIS vulnerability and manages to start a cmd.exe shell. He then proceeds to look for interesting files on the compromised server via the "dir" command.--Ease of Attack: Simple. This post-attack behavior can accompany different attacks.--False Positives: The rule will generate an event if the string "Volume Serial Number" appears in the content distributed by the web server, in which case the rule should be tuned.--False Negatives:None Known--Corrective Action: Investigate the web server for signs of compromise,Use system integrity checking software, check for other IDS alertsinvolving the same IP addresses.--Contributors: Snort documentation contributed by Anton Chuvakin <http://www.chuvakin.org>Sourcefire Vulnerability Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -