⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 457.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:457--Summary:This event is generated when an ICMP type 14 is detected that does not include the necessary code in the packet.--Impact:Can be used as a reconnaissance tool.  Traceroute reveals informationabout the layout of a network.--Detailed Information:There are at least three different implementations of traceroute.  Inone implementation traceroute works by sending an ICMP Echo Requestpacket to a destination host with a TTL value of 1.  If the host is morethan one hop away, the first route that receives the back will send backan ICMP packet indicating that the TTL was exceeded.  The address ofthis router is then listed as the first hop.  The packet is then sentout again with a TTL of 2.  This continues until the destination host isable to reply or some maximum TTL value is reached.The other two implementations use the same TTL-based concept with anICMP type of 30(traceroute) or with an UDP packet destined for anephemeral port.--Affected Systems:All--Attack Scenarios:Traceroute is often used against machines on a network prior to anattack.--Ease of Attack:Simple--False Positives:--False Negatives:None known.--Corrective Action:Block inbound ICMP type 30 messages.--Contributors:Original Rule Writer Max Vision <vision@whitehats.com>Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by  by Steven Alexander<alexander.s@mccd.edu>--Additional References:Miscellaneoushttp://www.faqs.org/rfcs/rfc1393.html--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -