代码搜索结果

找到约 10,000 项符合 State Machine 的代码

216.txt

Rule: -- Sid: 216 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "satori". This is a known password for the Satori Linux rootkit. --

208.txt

Rule: -- Sid: 208 -- Summary: Phase0 is a Trojan Horse offering the attacker control of the victim host. This event is generated when the victim server replies to an attackers client connection re

114.txt

Rule: -- Sid: 114 -- Summary: This event is generated when the Netbus trojan service is responding to an attackers commands on port 12346 -- Impact: Possible theft of data and control of the target

2271.txt

-- Rule: -- Sid: 2271 -- Summary: This event is generated when an attacker attempts to connect to the trojan FsSniffer. -- Impact: Possible theft of data and control of the targeted machine leading

1855.txt

Rule: -- Sid: 1855 -- Summary: This event is generated when activity indicating the presence of a variant of the Stacheldraht DDOS tool is detected. -- Impact: Distributed Denial of Service (DDoS)

218.txt

Rule: -- Sid: 218 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "friday". -- Impact: Possible theft of data and control of the targe

162.txt

Rule: -- Sid: 162 -- Summary: Matrix is a Trojan Horse offering the attacker the ability to upload files to, and download files from the victim host. -- Impact: Possible theft of data and control

153.txt

Rule: -- Sid: 153 -- Summary: Donald Dick is a Trojan Horse allowing the attacker to access various resources on the victim host. This event is generated when the attackers client connects to the T

161.txt

Rule: -- Sid: 162 -- Summary: Matrix is a Trojan Horse offering the attacker the ability to upload files to, and download files from the victim host. -- Impact: Possible theft of data and control

212.txt

Rule: -- Sid: 212 -- Summary: This event is generated when an attacker attempts to connect to a Telnet server using the phrase "rewt". -- Impact: Possible theft of data and control of the targete