1791.txt

来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 71 行

TXT
71
字号
Rule:  --Sid:1791--Summary:This event indicates that a backdoor may be installed on a machine.--Impact:One of the systems may have been compromised.--Detailed Information:www.monkey.org, the system that hosts fragroute was compromised and the fragroutesource code was modified to contain a back door.  The code was corrupted on May 17, 2002.  Versions after May 31, 2002  and before May 17, 2002 do not contain the backdoor.--Affected Systems:Systems running	dsniff 2.3	fragroute 1.2	fragrouter 1.6--Attack Scenarios:The backdoor contacts the IP address 216.80.99.202.  A person connecting from thataddress can use the backdoor to acquire full control over the compromised machine.  --Ease of Attack:Simple.--False Positives:While the IP address flagged in this rule was associated with the backdoor at the timefragroute was trojaned, it may now or in the future be used by unrelated parties.--False Negatives:None known.--Corrective Action:Upgrade to a new version of fragroute and sanitize the trojaned machine.   --Contributors:Sourcefire Research TeamBrian Caswell <bmc@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>-- Additional References:Bugtraq:http://www.securityfocus.com/bid/4898http://www.securityfocus.com/archive/1/274927--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?