亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? readme.flexresp2

?? This is the snapshot of Snot Latest Rules
?? FLEXRESP2
字號(hào):
$Id: README.FLEXRESP2,v 1.1 2004/09/13 21:37:26 jhewlett Exp $Snort flexresp2 README.(C) 2004 Jeff Nathan <jeff@snort.org>Warning-------Active response is not guaranteed to sucessfully terminate connections.  Snortis a passive system (except when used in 'inline' mode).  In a passive configuration, the process of active response is a race between Snort and the endpoints in network communication.  Depending on the CPU and/or bus speed of a system running Snort, available memory, I/O states, and network latency, Snort may or may not win this race in which case active response will have NO EFFECT.Active response is a supplementary tool, something deployed in addition to other security technologies.  It should not be relied upon solely to protect systems or services that are known to be vulnerable.The process of transmitting active response packets will "block" the rest ofthe system, meaning that while Snort is busy sending TCP reset or ICMP unreachable packets, it is unable to capture packets and perform other intrusion detection functions.  The amount of time spent performing active response is extremely small (measured in milliseconds) but can result in a degredation of performance in high-speed environments.A determined attacker can easily attack from behind a firewall configured to silently block all incoming traffic.  Sending TCP resets to the source of anattack is most likely a waste of time.  Only when the source is a system on your own network should you expect TCP resets to reach this system.  Keepin mind that Snort has both attack rules and attack-response rules.  Attackresponse rules will trigger when a host has sent traffic indicative of beingeffected by an attack.  I believe the only situation in which you shouldsend TCP resets to the sender is in conjunction with attack-response rules.Notice------Please note, flexresp and flexresp2 are *NOT* the same.The Snort source code distribution includes an older version of flexresp.  Thisversion does not operate in the same way as flexresp2.  While the Snort sourcecode contains the flexresp code, not every Snort binary is compiled to includethe older flexresp functionality.Conversely, flexresp2 is not included within the Snort source code distribution at this time.  If you do not apply a source code patch to your copy of the Snort 2.2.x source code, the --enable-flexresp2 switch will have no effect when you run the configure script.If you attempt to use the resp keyword in a Snort rule and you receive anerror message indicating the resp keyword is unknown, your Snort binaryhas not been compiled with either flexresp or flexresp2 functionality.Introduction------------The flexresp2 detection plugin for Snort allows users to configure rulesthat will attempt to actively terminate connection attempts.  The process ofactive response consists of two steps.First, You must create some Snort rules that use the resp keyword.  The respkeyword accepts the following modifiers:    reset_dest      send TCP reset packets to the destination of an attack    reset_source    send TCP reset packets to the source of an attack                     this is best used with attack-response rules    reset_both      send TCP reset packets to both the source and destination                     of an attack (the destination resets are sent first)                             icmp_net        send an ICMP network unreachable packet to the attack source    icmp_host       send an ICMP host unreachable packet to the attack source    icmp_port       send an ICMP port unrechable packet to the attack source    icmp_all        send all of the above to the attack sourceSecond, when a Snort rule specifying a resp keyword is matched, Snort willgenerate one or several packets in an attempt to actively terminate theconnection.Flexresp2 features----------------------------------------------------------To compensate for the fact that it's unlikely a TCP reset packet will reacheither the client or server before the host reacts to the attack packet, Snort tries to shutdown the connection with brute-force.  Flexpresp transmits a minimum of 4 TCP reset packets with shifting TCP sequence and ack numbers in an attempt to brute-force the connection into an unusable state.  This brute-forcing is achived using a technique called sequence strafing.  Flexresp2ddoes NOT examine TCP flags to determine whether or not a TCP packet shouldbe reset.  This is primarily due to inconsistencies in establishing TCP connections.  Reference: http://www.securityfocus.com/archive/1/296122/2002-10-19/2002-10-25/2Flexresp2 will automatically calculate the original TTL when sending a response packet (to make fingerprinting attempts more difficult).Flexresp2 will not respond to its own packets! (avoiding a potential DoS).  This is achieved using a hash to rate-limit responses.Flexresp2 can be configured to send responses from a link-layer (Ethernet) interface specified by you, the user.  When an Ethernet interface is specified, the kernel routing table is bypassed and Snort will ALWAYS send TCP resets and ICMP unreachable packets using that interface.Snort no longer requires root privileges to use active response (flexresp2)on Unix-like operating systems.  It's now possible to use the -u and -g command line switches with active response.Configuration-------------Enabling link-layer response in snort.conf on Unix-like systems:    config flexresp2_interface: <device name>Enabling link-layer response in snort.conf on Windows systems:    config flexresp2_interface: <device name or device number*>* Use the -W command line option to list network devices by number.Configure the number of brute-force TCP resets in snort.conf:    config flexresp2_attempts: <number of attempts (5 - 20)>Configure the memcap of the cache of previous responses in snort.conf:    config flexresp2_memcap: <memcap in bytes>Configure the number of rows in the cache of previous responses in snort.conf:    config flexresp2_rows: <rows>To add a resp action to a Snort rule, the resp keyword must be followedby a colon (:) followed by one or several response modified (multiple modifiers are separated by commas).  Here are a few examples:(A simple TCP example)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"SMTP HELO overflow attempt"; flow:to_server,established; content:"HELO "; offset:0; depth:5; content:!"|0a|"; within:500; reference:bugtraq,895; reference:cve,CVE-2000-0042; reference:nessus,10324; reference:bugtraq,7726; reference:nessus,11674; classtype:attempted-admin; sid:1549; rev:11; resp:reset_dest;)(A simple TCP attack-response example)alert tcp $HOME_NET 8002 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES oracle one hour install"; flow:from_server,established; content:"Oracle Applications One-Hour Install"; classtype:bad-unknown; sid:1464; rev:3; resp:reset_source;)(A simple UDP example)alert udp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS named authors attempt"; content:"|07|authors"; nocase; offset:12; content:"|04|bind"; nocase; offset: 12; reference:nessus,10728; reference:arachnids,480; classtype:attempted-recon; sid:256; rev:3; resp:icmp_port;)(A complex TCP example)alert tcp $EXTERNAL_NET any -> $HOME_NET 445 (msg:"NETBIOS SMB DCERPC ISystemActivator bind attempt"; flow:to_server,established; content:"|FF|SMB|25|"; nocase;offset:4; depth:5; content:"|26 00|"; distance:56; within:2; content:"|5c 00|P|00|I|00|P|00|E|00 5c 00|"; nocase; distance:5; within:12; content:"|05|"; distance:0; within:1; content:"|0b|"; distance:1; within:1; byte_test:1,&,1,0,relative; content:"|A0 01 00 00 00 00 00 00 C0 00 00 00 00 00 00 46|"; distance:29; within:16; reference:cve,CAN-2003-0352; classtype:attempted-admin; sid:2193; rev:1; resp:reset_dest;)(A complex TCP attack-response example)alert tcp $HOME_NET !21:23 -> $EXTERNAL_NET any (msg:"ATTACK-RESPONSES Microsoft cmd.exe banner"; flow:from_server,established; content:"Microsoft Windows"; content:"(C) Copyright 1985-"; distance:0; content:"Microsoft Corp."; distance:0; reference:nessus,11633; classtype:successful-admin; sid:2123; rev:1; resp:reset_source;)Make sure to read the Snort users guide for a complete explanation of theSnort rules language.  The user's guide is in the same directory as this fileand it's available on the Snort website.Notes for Unix-like systems---------------------------To compile and use flexresp2 on Unix-like systems you must compile and install the libdnet library written by Dug Song.  If your system doesn't have the library installed, download the source code at  http://libdnet.sourceforge.netOnce libdnet has been compiled AND installed (don't forget make install) on a Unix-like system, follow the directions in the section below for building Snort with flexresp2.  Unix-like systems with multiple network interfaces can avoid routing problems using the instructions in the Configuration section above.Build instructions for Unix-like systems----------------------------------------!!!!! The following instructions require GNU autoconf and GNU automake !!!!!Anything following a hash character (#) is a command.a) copy the patch into the top level Snort source distribution directory   if your Snort directory uses a different name, this is not a problem   just make sure you know which version of Snort you intend to compile  # cd snort-2.2.0RC1  # cp <path to sp_respond2.diff.gz> .b) decompress the patch with gzip  # gzip -d sp_respond2.diff.gzc) patch the Snort source code  # patch -p0 < sp_respond2.diffd) regenerate the configure script (this step REQUIRES that GNU autoconf and    GNU automake are installed)  # ./autojunk.sh  NOTE: systems with multiple versions of GNU autoconf should use version 2.5x        of autoheader and autoconf.e) run the configure script with your desired arguments  # ./configure --enable-flexresp2f) compile Snort  # makeIf Snort is unable to locate either the libdnet header file (dnet.h) or thelibnet library (either dnet.a or dnet.so) there are two additional configure options that can be used to specify extra directories to search:--with-dnet-includes=DIR     If the configuration script can't find the libdnet include files on its     own, the path can be set manually with this switch.--with-dnet-libraries=DIR     If the configuration script can't find the libdnet library files on its     own, the path can be set manually with this switch.NOTE: When specifying a directory with either --with-dnet-includes or--with-dnet-libraries a trailing / character should *NOT* be specified.Notes for Microsoft Windows---------------------------Coming soon.Build instructions for Windows systems--------------------------------------Coming soon.

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人高清免费观看| 欧美私模裸体表演在线观看| 亚洲综合一区二区三区| 欧美一区二区三区不卡| 成人av午夜电影| 热久久久久久久| 亚洲视频狠狠干| 欧美变态口味重另类| 91麻豆产精品久久久久久 | 日日夜夜精品免费视频| 久久精品一区二区三区不卡牛牛| 色噜噜久久综合| 成人在线视频首页| 久久精品久久99精品久久| 夜夜精品视频一区二区| 日本一区二区三区免费乱视频| 欧美疯狂做受xxxx富婆| 91视频com| 成人午夜视频免费看| 老司机午夜精品| 亚洲成人一区在线| 亚洲综合一二区| 国产精品久久久久久久久晋中 | 偷拍一区二区三区| 中文字幕欧美一| 国产日韩成人精品| 欧美videofree性高清杂交| 欧美日韩中文字幕一区| 一本到不卡精品视频在线观看 | 国产成a人亚洲精| 免费成人av在线播放| 亚洲18色成人| 亚洲va国产天堂va久久en| 一区二区三区欧美| 亚洲人xxxx| 亚洲素人一区二区| 亚洲精品中文字幕在线观看| 国产精品视频麻豆| 中文在线资源观看网站视频免费不卡| 久久亚洲免费视频| 久久九九国产精品| 国产视频一区在线观看| 国产视频一区在线播放| 中文字幕乱码久久午夜不卡 | 奇米四色…亚洲| 香蕉成人啪国产精品视频综合网| 一级精品视频在线观看宜春院| 亚洲欧美日韩电影| 亚洲精品国产a| 亚洲成人免费在线观看| 婷婷国产在线综合| 美女一区二区三区在线观看| 久久精品免费观看| 国产一区高清在线| 成人av电影免费在线播放| 9久草视频在线视频精品| 99re成人在线| 欧美视频日韩视频| 日韩欧美国产一区二区在线播放| 欧美精品一区二区三区一线天视频| 精品成a人在线观看| 久久亚洲春色中文字幕久久久| 国产精品免费久久| 亚洲精品va在线观看| 日韩精品欧美精品| 国产精品18久久久久久久网站| 国产91丝袜在线18| 色婷婷综合久久久久中文一区二区| 欧美在线小视频| 欧美大片拔萝卜| 国产精品毛片无遮挡高清| 亚洲女子a中天字幕| 日韩国产一区二| 国产精品一级二级三级| 色综合中文字幕| 欧美电影精品一区二区| 国产精品电影一区二区三区| 偷拍一区二区三区四区| 国产精品一区二区在线观看不卡 | 99v久久综合狠狠综合久久| 欧亚一区二区三区| 亚洲精品一线二线三线无人区| 成人免费一区二区三区在线观看| 午夜精品一区二区三区免费视频| 美日韩一区二区| 99精品视频中文字幕| 91.麻豆视频| 中文字幕日韩av资源站| 蜜臀av一区二区三区| www.视频一区| 日韩精品一区二区三区在线播放 | 亚洲视频在线观看一区| 日本女优在线视频一区二区| 国产91精品一区二区麻豆网站| 欧美亚洲一区二区在线| 欧美精品一区二区久久久| 亚洲电影激情视频网站| 成人美女视频在线观看| 日韩欧美成人一区| 亚洲一卡二卡三卡四卡五卡| 国产精品一区二区果冻传媒| 欧美剧情片在线观看| 亚洲图片欧美激情| 国产精品亚洲专一区二区三区| 欧美性三三影院| 欧美国产1区2区| 国内成人精品2018免费看| 欧美视频一区二区| 最新欧美精品一区二区三区| 久国产精品韩国三级视频| 一本一本大道香蕉久在线精品| 国产偷国产偷精品高清尤物| 男人的天堂久久精品| 欧美三级乱人伦电影| 亚洲欧美激情小说另类| 成人手机电影网| 久久久久久久久久久黄色| 人人超碰91尤物精品国产| 欧美色图在线观看| 亚洲日本在线看| 国产91在线看| 国产亚洲成av人在线观看导航 | 国产精品久久久久四虎| 精品一区二区成人精品| 欧美丰满高潮xxxx喷水动漫| 亚洲激情六月丁香| 99在线精品免费| 亚洲国产成人在线| 国产成人免费视频网站 | 一区二区三区四区视频精品免费| 成人性生交大片免费| 精品电影一区二区| 国产做a爰片久久毛片| 欧美一级高清片在线观看| 婷婷久久综合九色综合伊人色| 欧美色老头old∨ideo| 一区二区三区四区在线免费观看| 一本久久综合亚洲鲁鲁五月天| 国产精品美女久久久久久| 成人国产精品免费观看动漫| 国产精品久久久久久亚洲毛片| aa级大片欧美| 伊人夜夜躁av伊人久久| 欧美性一二三区| 日精品一区二区三区| 91精品久久久久久久91蜜桃| 蜜乳av一区二区| 久久色.com| 成人美女在线观看| 亚洲欧美另类久久久精品2019| 色综合咪咪久久| 亚洲成av人片www| 欧美一区2区视频在线观看| 美女一区二区在线观看| 国产亚洲一区字幕| 不卡一区在线观看| 亚洲一区在线视频| 日韩一区二区免费在线电影| 国内不卡的二区三区中文字幕| 久久精品一区四区| 色噜噜夜夜夜综合网| 日本成人在线视频网站| 国产三区在线成人av| 91啪在线观看| 日韩福利电影在线观看| 久久久综合视频| 色综合久久久久| 蜜臀av一区二区三区| 中文字幕乱码日本亚洲一区二区| 色狠狠综合天天综合综合| 免费观看成人av| 国产精品免费久久久久| 欧美性大战久久久久久久蜜臀 | 国产成人免费视| 亚洲色图.com| 日韩欧美一级精品久久| 99久久er热在这里只有精品66| 污片在线观看一区二区| 国产丝袜欧美中文另类| 欧美性极品少妇| 国产成人精品免费在线| 亚洲宅男天堂在线观看无病毒| 日韩欧美在线网站| 99久久综合精品| 青青草97国产精品免费观看| 国产精品美女久久久久aⅴ| 欧美老女人第四色| av男人天堂一区| 蜜臀久久99精品久久久画质超高清 | 一道本成人在线| 精品一区二区久久久| 一区二区三区久久| 国产日韩v精品一区二区| 欧美三级日韩三级| 99国产精品国产精品久久| 激情综合色播五月| 亚洲成a人v欧美综合天堂| 国产精品久久久久久久久免费相片| 日韩一区二区免费高清| 欧美在线999|