⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 498.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:498-- Summary: This event is generated by the use of a UNIX "id" command. This may be indicative of post-compromise behavior where the attacker is checking for super user privileges gained by a sucessful exploit against a vulnerable system.-- Impact: Serious. An attacker may have gained super user access to the system.--Detailed Information:This event is generated when a UNIX "id" command is used to confirm theuser name of the currenly logged in user over an unencrypted connection. This connection can either be a legitimate telnet connection or theresult of spawning a remote shell as a consequence of a successfulnetwork exploit. The string "uid=0(root)" is an output of an "id" command indicating thatthe user has "root" privileges.  Seeing such a response indicates thatsome user, connected over the network to a target server, has root privileges.--Attack Scenarios: A buffer overflow exploit against an FTP server results in "/bin/sh"being executed. An automated script performing an attack, checks for thesuccess of the exploit via an "id" command.-- Ease of Attack: Simple. This may be post-attack behavior and can be indicative of thesuccessful exploitation of a vulnerable system.-- False Positives: This rule will generate an event if a legitimate system administratorexecutes the "id" command over an unencrypted connection to verify theprivilege level available to him.This rule may also generate event by viewing the documentation onsnort.org or any other security related web site which may containdetails on this issue.The web site www.bugtraq.org serves a non-standard HTTP header of theform "X-Mandatory-Snort-Alert: *GOBBLE* uid=65534(nobody) uid=0(root)"browsing this site will generate an event.--False Negatives:None Known-- Corrective Action: Ensure that this event was not generated by a legitimate session theninvestigate the server for signs of compromiseLook for other events generated by the same IP addresses.--Contributors: Original rule writer unknownSnort documentation contributed by Anton Chuvakin <http://www.chuvakin.org>Sourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Additional false positive information contributed by Arnd Fischer-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -