⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1284.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  Sid:1284--Summary:This event is generated when an attempt is made to download aNimda-infected attachment from a web server.--Impact:Serious. A Nimda-infected web server may have spread the Nimda worm to the webclient.--Detailed Information:One of the methods the Nimda worm uses to propagate is by passing maliciouscode from an infected web server to a web client.  The Nimda-infectedcode often uses the filename extension ".EML".The fully automated Nimda worm that has already infected an IIS web serversearches through and infects the local web pages with malicious javascript.When a vulnerable web client attempts to load a web page from this server,the javascript will cause the web client to download and execute theNimda-infected readme.eml file, causing the web client to becomeNimda-infected.--Affected Systems:	Microsoft Windows based systems.--Attack Scenarios:The user must use a link on an infected server.--Ease of Attack:Simple. This is worm activity.--False Positives:None Known--False Negatives:The Nimda worm may spread via any file with the .EML or .NWS extension, notjust readme.eml.  This rule will not catch other .EML or .NWS files.--Corrective Action:Examine the host for signs of infection.Use Anti-Virus tools to clean an infected host.Consider the use of alternative operating systems that are notvulnerable to this kind of attack.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -