⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 1336.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:1336--Summary:Attempted chmod command access via web--Impact:Attempt to change file permissions on a webserver.--Detailed Information:This is an attempt to change file permissions on a machine. Using thiscommand an attacker may change the permissions of a file to suit his ownneeds, make a file readable, writeable or excutable to other groups andusers that wouldotherwise not have these special permissions.--Attack Scenarios:The attacker can make a standard HTTP request that contains '/bin/chmod'in the URI whichcan then change file permissions of files present onthe host.Thiscommand may also be requested on a command line shouldthe attacker gainaccess to the machine.--Ease of Attack:Simple HTTP request.--False Positives:None Known--False Negatives:None Known--Corrective Action:Webservers should not be allowed to view or execute files and binariesoutside ofit's designated web root or cgi-bin.Whenever possible,sensitive files andcertain areas of the filesystem should have thesystem immutable flagset to negate the use of the chmod command. OnBSD derived systems,setting the systems runtime securelevel alsoprevents the securelevelfrom being changed. (note: the securelevel canonly beincreased)--Contributors:Sourcefire Research Team-- Additional References:sid: 1337sid: 1338man chmod--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -