⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 556.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:556--Summary:A network-internal client has connected to an external GNUTella serverand issued a connect attempt to begin communications.--Impact:Possible policy violation.--Detailed Information:GNUTella is a P2P (Peer-to-Peer) protocol for exchanging arbitraryfiles.  Depending on your site's policies, using it may be a policyviolation.If not properly configured, GNUTella clients may accidentally share outconfidential files.  GNUTella worms (which use deceptive names toencourage download) and viruses may also be accidentally downloaded by aclient.This rule being triggered means that a GNUTella client has been detectedon your network.--Affected Systems:Any system with a GNUTella client installed (available for mostplatforms)--Attack Scenarios:It is possible for an inside attack to take place by using peer-to-peerclients to transfer corporate data from an internal resource to anexternal third party.--Ease of Attack:Simple. This is peer-to-peer activity.--False Positives:This rule detects the term "GNUTELLA CONNECT" on all ports.  As aresult, any email, web page, or other network content that discusses theprotocol and its messages will trigger this alert.--False Negatives:None known.--Corrective Action:Depends on acceptable use policies.--Contributors:Original Rule Writer UnknownSnort documentation contributed by Gene R Gomez (gene!AT!gomezbrothers!DOT!com)-- Additional References:GNUTellahttp://www.gnutella.comGnutella Protocolhttp://rfc-gnutella.sourceforge.net/developer/testing/--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -