snort入侵检测规则文件2.4 Snort是众所周知的网络入侵检测工具

源代码在线查看: 229.txt

软件大小: 771 K
上传用户: lihuitao1987
关键词: snort Snort 2.4 入侵检测
下载地址: 免注册下载 普通下载 VIP

相关代码

				Rule:								--				Sid:				229								--				Summary:				This event is generated when a Stacheldraht agent attempts to contact a known handler.								--				Impact:				This indicates that a Stacheldraht agent may exist on the source host and a handler may exist on the destination host.								--				Detailed Information:				The Stacheldraht DDoS uses a tiered structure of compromised hosts to coordinate and participate in a denial of service attack.  								There are "handler" hosts that are used to coordinate the attacks and "agent" hosts that launch the attack.  Once a host becomes a Stacheldraht agent, it will attempt to contact a list of known handlers using an ICMP echo reply with an ICMP identification number of 666 and a string of "skillz" in the payload. 								--				Affected Systems:				Any Stacheldraht compromised host.								--				Attack Scenarios:				A compromised host that has become a Stacheldraht agent will attempt an initial communication with all known handlers.								--				Ease of Attack:				Simple. Stacheldraht code is freely available.								--				False Positives:				None Known.								--				False Negatives:				None Known.								--				Corrective Action:				Perform proper forensic analysis on the suspected compromised host to discover the means of compromise.								Rebuild a confirmed compromised host.								Use a packet filtering firewall to block inappropriate traffic to the network to prevent hosts from being compromised.								--				Contributors:				Original rule written by Max Vision 				Sourcefire Research Team				Judy Novak 								--				Additional References:								Arachnids:				http://www.whitehats.com/info/IDS190								--							

相关资源