710.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 72 行
TXT
72 行
Rule:--Sid:710--Summary:This event is generated after an attempted login to a telnet server using the username OutOfBox.--Impact:Unauthorized remote access.--Detailed Information:Some SGI machines are shipped with an easy setup group of scripts toassist the user when setting up the host. This group of programs iscalled EZsetup and may install some passwordless default accounts on the machine.This event is generated when an attempt is made to login to a serverusing the username OutOfBox via Telnet. This is a default account on someSGI based machines. The password may also be OutOfBox or it may not havea password assigned.Repeated events from this rule may indicate a determined effort to guessthe password for this account.--Affected Systems: SGI Telnet servers.--Attack Scenarios:An attacker may attempt to connect to a telnet server using the usernameOutOfBox.--Ease of Attack:Simple--False Positives:None known.--False Negatives:None known.--Corrective Action:Disable the OutOfBox account.Choose the most secure options when using EZsetup.Use ssh as an alternative to TelnetBlock inbound telnet access if it is not required.--Contributors:Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?