- 论坛徽章:
- 1
|
#\r\n# alert TCP any any -> any 80 (msg: \"EXPLOIT ntpdx overflow\";\r\n# dsize: > 128; classtype:attempted-admin; priority:10;\r\n#\r\n# alert TCP any any -> any 25 (msg:\"SMTP expn root\"; flags:A+; \\\r\n# content:\"expn root\"; nocase; classtype:attempted-recon \r\n#\r\n# The first rule will set its type to \"attempted-admin\" and override\r\n# the default priority for that type to 10.\r\n#\r\n# The second rule set its type to \"attempted-recon\" and set its\r\n# priority to the default for that type.\r\n#\r\n#\r\n# config classification:shortname,short description,priority\r\n#\r\nconfig classification: not-suspicious,Not Suspicious Traffic,3\r\nconfig classification: unknown,Unknown Traffic,3\r\nconfig classification: bad-unknown,Potentially Bad Traffic, 2\r\nconfig classification: attempted-recon,Attempted Information Leak,2\r\nconfig classification: successful-recon-limited,Information Leak,2\r\nconfig classification: successful-recon-largescale,Large Scale\r\nInformation Leak,2\r\nconfig classification: attempted-dos,Attempted Denial of Service,2\r\nconfig classification: successful-dos,Denial of Service,2\r\nconfig classification: attempted-user,Attempted User Privilege Gain,1\r\nconfig classification: unsuccessful-user,Unsuccessful User Privilege\r\nGain,1\r\nconfig classification: successful-user,Successful User Privilege Gain,1\r\nconfig classification: attempted-admin,Attempted Administrator\r\nPrivilege Gain,1\r\nconfig classification: successful-admin,Successful Administrator\r\nPrivilege Gain,1\r\n# NEW CLASSIFICATIONS\r\nconfig classification: rpc-portmap-decode,Decode of an RPC Query,2\r\nconfig classification: shellcode-detect,Executable code was detected,1\r\nconfig classification: string-detect,A suspicious string was detected,3\r\nconfig classification: suspicious-filename-detect,A suspicious filename\r\nwas detected,2\r\nconfig classification: suspicious-login,An attempted login using a\r\nsuspicious username was detected,2\r\nconfig classification: system-call-detect,A system call was detected,2\r\nconfig classification: tcp-connection,A TCP connection was detected,4\r\nconfig classification: trojan-activity,A Network Trojan was detected, 1\r\nconfig classification: unusual-client-port-connection,A client was\r\nusing an unusual port,2\r\nconfig classification: network-scan,Detection of a Network Scan,3\r\nconfig classification: denial-of-service,Detection of a Denial of\r\nService Attack,2\r\nconfig classification: non-standard-protocol,Detection of a nonstandard\r\nprotocol or event,2\r\nconfig classification: protocol-command-decode,Generic Protocol Command\r\nDecode,3\r\nconfig classification: web-application-activity,access to a potentially\r\nvulnerable web application,2\r\nconfig classification: web-application-attack,Web Application Attack,1\r\nconfig classification: misc-activity,Misc activity,3\r\nconfig classification: misc-attack,Misc Attack,2\r\nconfig classification: icmp-event,Generic ICMP event,3\r\nconfig classification: kickass-porn,SCORE! Get the lotion!,1\r\nconfig classification: policy-violation,Potential Corporate Privacy\r\nViolation,1\r\nconfig classification: default-login-attempt,Attempt to login by a\r\ndefault username and password,2 |
|