⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 567.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid: 567--Summary: This event is generated when a failed attempt is made to use a Simple Mail Transfer Protocol (SMTP) server to relay mail to a third party.--Impact: Rejected of unauthorized use.  This event indicates that an SMTP server is properly configured to reject mail relay attempts.--Detailed Information: An attacker may attempt to use an improperly configured SMTP server to relay mail, reflecting the origin of the mail to be the relay SMTP server instead of the actual sender.  A poorly configured SMTP server may be used to relay spam and other undesirable mail.  If an SMTP server rejects relay attempts, it will return an error message indicating the failure.  --Affected Systems: SMTP servers--Attack Scenarios: An attacker may attempt to relay mail through an improperly configured SMTP server.--Ease of Attack: Simple--False Positives: None Known--False Negatives: An SMTP server may reject mail using other errors.--Corrective Action: Configure an SMTP server to reject relayed mail.--Contributors:Original rule written by Max Vision <vision@whitehats.com>Modified by Brian Caswell <bmc@sourcefire.com>Snort documentation contributed by Chaos <c@aufbix.org>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>-- Additional References:Arachnidshttp://www.whitehats.com/info/IDS249Miscellaneoushttp://mail-abuse.org/tsi/ar-fix.html--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -