代码搜索结果
找到约 10,000 项符合
State Machine 的代码
208.txt
Rule:
--
Sid:
208
--
Summary:
Phase0 is a Trojan Horse offering the attacker control of the victim
host. This event is generated when the victim server replies to an
attackers client connection re
114.txt
Rule:
--
Sid:
114
--
Summary:
This event is generated when the Netbus trojan service is responding to
an attackers commands on port 12346
--
Impact:
Possible theft of data and control of the target
2271.txt
--
Rule:
--
Sid:
2271
--
Summary:
This event is generated when an attacker attempts to connect to the
trojan FsSniffer.
--
Impact:
Possible theft of data and control of the targeted machine leading
1855.txt
Rule:
--
Sid:
1855
--
Summary:
This event is generated when activity indicating the presence of a variant of the Stacheldraht DDOS tool is detected.
--
Impact:
Distributed Denial of Service (DDoS)
218.txt
Rule:
--
Sid:
218
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "friday".
--
Impact:
Possible theft of data and control of the targe
162.txt
Rule:
--
Sid:
162
--
Summary:
This event is generated when Trojan Horse activity is detected from the program Matrix.
--
Impact:
Possible theft of data and control of the targeted machine leading t
153.txt
Rule:
--
Sid:
153
--
Summary:
Donald Dick is a Trojan Horse allowing the attacker to access various
resources on the victim host. This event is generated when the attackers
client connects to the T
161.txt
Rule:
--
Sid:
161
--
Summary:
This event is generated when Trojan Horse activity is detected from the program Matrix.
--
Impact:
Possible theft of data and control of the targeted machine leading t
212.txt
Rule:
--
Sid:
212
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "rewt".
--
Impact:
Possible theft of data and control of the targete
211.txt
Rule:
--
Sid:
211
--
Summary:
This event is generated when an attacker attempts to connect to a
Telnet server using the phrase "r00t".
--
Impact:
Possible theft of data and control of the targete