⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 650.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:  --Sid:650--Summary:Shellcode to set the user identity to 0 (root) was detected.--Impact:If this code is executed successfully, it is possible for the currentprocess to inherity root privledges.  However, setuid(2) requires rootprivledges to be executed in the first place if the current uid isattempting to get a higher priviledge level.--Detailed Information:Snort detected data resembling the x86 assembly code to change theuser identity to 0.  --Affected Systems: --Attack Scenarios:As part of an attack on a remote service, an attacker may attempt totake advantage of insecure coding practices and execute code of his orher choosing through techniques known as 'buffer-overflows','format-strings' and others.  Such attacks may contain code to changethe identity of the current user to that of the root account (setuid0).  --Ease of Attack:Non-trivial.  Shellcode (and just x86 assembly code in general)requires a fairly intimate knowledge of computer architecture, memorystructures, and many concepts that are part of the more arcane areasof computing.  Furthermore, if this was in fact an attack, theattacker needs to have a good idea of the design of the both theprogram and the system that he or she is attacking. The x86 setuidcall itself is not particularly difficult, and by itself is notharmful.  However, combined with other carefuly aimed shellcode, itcan be quite lethal.--False Positives:None KnownFairly high.  Large binary transfers, certain web traffic, and evenmail traffic can trigger this rule, but are not necessarily indicativeof actualy setuid code.--False Negatives:None KnownUnknown, but probably possible.--Corrective Action:Determine what stream of traffic generated this particular alert.  Ifyou only have the alert but not the entire packet, examine system forpecularities.  If you are smart and have the entire packet (or betteryet, all your traffic for the past n hours), attempt to determine ifthis particular sequence of characters was part of an innocent streamof data (large binary transfers, for example) or part of a maliciousact against your machine.  In either case, check for other activityfrom the host in question -- both currently collected traffic andtraffic in the future.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org> -- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -