475.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 67 行
TXT
67 行
Rule:--Sid:475--Summary:This event is generated when a network host generates an ICMP datagramwith Record Route IP options.--Impact:Packets containing IP Record Route options are used to emulate the functionalityof traceroute. --Detailed Information:The Record Route IP option is used to store routing information about thepath a datagram takes to its destination. ICMP ECHO packets with an IP headerutilizing the Record Route option are used to emulate the functionality oftraceroute.--Attack Scenarios:A remote attacker may attempt to use the Record Route IP option to determinerouting information if traceroute fails.--Ease of Attack:Numerous tools and scripts can generate this type of datagram.--False Positives:Network diagnostic tools may generate these types of datagrams.--False Negatives:None known--Corrective Action:Use ingress filtering to block incoming datagrams with the IP Record Route option.--Contributors:Original rule writer unknownSourcefire Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)--Additional References:http://www.whitehats.com/info/IDS238--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?