⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 3542.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule: --Sid:3542-- Summary: This event is generated when an attempt is made to access a host runningMicrosoft SQL Server or utilizing MSDE via the default "sa" account.-- Impact: Information disclosure. Unauthorized administrative access to the host.--Detailed Information:This event is generated when an attempt is made to access a host via the"sa" account using brute force techniques to guess a password.Microsoft SQL server and MSDE components use a default "sa" account witha default password as the administrative user for the databaseinstallation. This event indicates that numerous failed attempts havebeen made to access the target host using this account.--Affected Systems:	Microsoft SQL Server 2000	Microsoft SQL Server 7.0	Systems using Microsoft MSDE components--Attack Scenarios:  An attacker can use an automated script to gain access to a host and thedatabase contents as an administrator by repeatly attempting to loginusing the "sa" account and different passwords.Some worms also try to brute force entry using this methodology.-- Ease of Attack: Simple,-- False Positives: None Known--False Negatives: None Known-- Corrective Action: Apply the appropriate vendor supplied patchesChange the default "sa" passwordDisable the "sa" account.--Contributors: Sourcefire Research TeamAlex Kirk <alex.kirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -