⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 648.txt

📁 snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具
💻 TXT
字号:
Rule:--Sid:648--Summary:A series of NOP instructions for Intel's x86 architecure was detected.--Impact:As part of an attack on a remote service, an attacker may attempt totake advantage of insecure coding practices in hopes of executingarbitrary code.  This procedure generally makes use of NOPs.--Detailed Information:The NOP allows an attacker to fill an address space with a largenumber of NOPs followed by his or her code of choice.  This allows"sledding" into the attackers shellcode.--Affected Systems:	All x86 based systems--Attack Scenarios:If a particular service was written using unsafe functions withoutbounds checking (strcpy(), strcat(), sprintf() etc...), it is possibleto write arbitrary data to the address space of the service.Normally, this may just cause the program to die a horrible death.However, if you can get the return address to point to the beginningof the newly written data, it is possible to execute code of yourchoice.  This requires that the newly written data is actualexecutable data.  Since calculating exactly where the return addressmay point to is no small task, a popular technique is to pad the spaceleading up to your shellcode with NOPs.  This way, if the returnaddress points anywhere in the series of NOPS, execution will slidedown into your shellcode.--Ease of Attack:Not-so trivial.  This particular technique requires a knowledge of x86assembly coding, memory, and usually an intimate understanding of thecode that one is attempting to exploit.  Unfortunately, there arehundreds upon hundreds of canned exploits that nearly anyone with theability point-and-click can use and wreak havok with.--False Positives:The x86 NOP can frequently be found in day-to-day traffic,particularly when transfering large files. --False Negatives:There are other techniques to emulate a NOP.  Additionally, ifthe attackers NOP sled is small enough (< 15), this particular attackmay slip by.  Fortunately, NOP sleds are generally quite large.--Corrective Action:Determine if this NOP was part of an attack or simply part of aninnocent stream of data.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org>-- Additional References:--

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -