2175.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 70 行
TXT
70 行
Rule:--Sid:2176--Summary:This event is generated when an attempt is made to access a systemfile via SMB. --Impact:Serious. This file contains important operating system information.--Detailed Information:This event indicates that an attempt was made to access a filecontaining important operating system information using SMB across thenetwork.--Affected Systems:Microsoft Windows systems.--Attack Scenarios:If this file is accessible via SMB the attacker can manipulate theoperating system registry settings.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None Known.--Corrective Action:Check the host for signs of system compromise.Turn off file and print sharing on the target host.Use a packet filtering firewall to disallow SMB access to the host fromsources external to the protected network.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:Microsoft Technethttp://support.microsoft.com/support/kb/articles/q153/1/83.aspCVEhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-0562Winreghttp://www.rutherfurd.net/python/winreg/--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?