📄 557.txt
字号:
Rule: --Sid:557--Summary:A network-internal server has authenticated an external GNUTella clientconnection attempt and they have begun communications.--Impact:Possible policy violation.--Detailed Information:GNUTella is a P2P (Peer-to-Peer) protocol for exchanging arbitraryfiles. Depending on your site's policies, using it may be a policyviolation.If not properly configured, GNUTella clients may accidentally share outconfidential files. GNUTella worms (which use deceptive names toencourage download) and viruses may also be accidentally downloaded by aclient.This rule being triggered means that a GNUTella server has been detectedon the protected network.--Affected Systems:Any system with a GNUTella server installed (available for mostplatforms)--Attack Scenarios:It is possible for an inside attack to take place by using peer-to-peerclients to transfer corporate data from an internal resource to anexternal third party.--Ease of Attack:Simple. This is peer-to-peer activity.--False Positives:This rule detects the term "GNUTELLA OK" on all ports. As a result, anyemail, web page, or other network content that discusses the protocoland its messages will trigger this alert.--False Negatives:None known.--Corrective Action:Depends on acceptable use policies.--Contributors:Original Rule Writer UnknownSnort documentation contributed by Gene R Gomez (gene!AT!gomezbrothers!DOT!com)-- Additional References:GNUTellahttp://www.gnutella.comGnutella Protocolhttp://rfc-gnutella.sourceforge.net/developer/testing/--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -