618.txt
来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 58 行
TXT
58 行
Rule:--Sid:618--Summary:This event is generated when a scan is detected. --Impact:Information gathering.--Detailed Information:This event indicates that an attempt has been made to scan a host.This may be the prelude to an attack. Scanners are used to ascertain which ports a host may be listening on, whether or not the ports are filtered by a firewall and if the host is vulnerable to a particular exploit.--Affected Systems:Any host.--Attack Scenarios:An attacker can determine if ports 21 and 20 are being used for FTP. Then the attacker might find out that the FTP service is vulnerable to a particular attack and is then able to compromise the host.--Ease of Attack:Simple.--False Positives:A scanner may be used in a security audit.--False Negatives:None Known.--Corrective Action:Determine whether or not the scan was legitimate then look for other events concerning the attacking IP address.Check the host for signs of compromise.--Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?