256.txt

来自「snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具」· 文本 代码 · 共 62 行

TXT
62
字号
Rule:  --Sid:256--Summary:This event is generated when an attempt is made to query authors.bind chaos record on a DNS server.  --Impact:Information gathering. This activity may indicate reconnaisance before an impending attack.--Detailed Information:Bind 9.x allows you get the authors.bind chaos record.  The ability toretrieve this file indicates that the machine is running at least a9.x variant of the bind nameserver.--Affected Systems:	All DNS Servers using Bind --Attack Scenarios:As part of a reconnaissance mission, an attacker may attempt to gleanimportant information about network infrastructure by determining thebind version on a nameserver. If authors.bind is retrievable, thisindicates that Bind 9.x is in use.--Ease of Attack:Simple.--False Positives:None Known--False Negatives:None Known--Corrective Action:Remove the ability to retrieve the authors.bind chaos record by changing the DNS configuration accordingly.--Contributors:Original rule writer unknownSnort documentation contributed by Jon Hart <warchild@spoofed.org>Sourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?