亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? smtp_bdat-overflow.c

?? This is the snapshot of Snot Latest Rules
?? C
字號:
/* * Use at your own risk. * * Copyright (C) 2005-2008 Sourcefire, Inc. *  * Written by Patrick Mullen <pmullen@sourcefire.com> using rules2c as a base!!! DOES *NOT* USE BUILT-IN DETECTION FUNCTION !!!Hell, this "base rule" is now horribly out of date.alert tcp $EXTERNAL_NET any -> $HOME_NET 25 (msg:"SMTP BDAT buffer overflow attempt"; flow:to_server,established; content:"BDAT"; nocase; pcre:"/^\s*BDAT\s+/smiR"; content:"|0a|"; distance:0; metadata:policy security-ips drop; reference:url,www.microsoft.com/technet/security/bulletin/ms02-012.mspx; reference:cve,2002-0055; reference:bugtraq,4204; classtype:attempted-admin; sid:13718; rev:1;) */#include "sf_snort_plugin_api.h"#include "sf_snort_packet.h"/* declare detection functions */int rule13718eval(void *p);/* declare rule data structures *//* precompile the stuff that needs pre-compiled *//* flow:established, to_server; */static FlowFlags rule13718flow0 = {    FLOW_ESTABLISHED|FLOW_TO_SERVER};static RuleOption rule13718option0 ={    OPTION_TYPE_FLOWFLAGS,    {        &rule13718flow0    }};// content:"BDAT", nocase; static ContentInfo rule13718content1 = {    (u_int8_t *) "BDAT", /* pattern (now in snort content format) */    0, /* depth */    0, /* offset */    CONTENT_NOCASE|CONTENT_BUF_RAW, /* flags */ // XXX - need to add CONTENT_FAST_PATTERN support    NULL, /* holder for boyer/moore PTR */    NULL, /* more holder info - byteform */    0, /* byteform length */    0 /* increment length*/};static RuleOption rule13718option1 = {    OPTION_TYPE_CONTENT,    {        &rule13718content1    }};// pcre:"^BDAT\s+", dotall, multiline, nocase;static PCREInfo rule13718pcre2 ={    "^BDAT\\s+", /* pattern */    NULL,                               /* holder for compiled pattern */    NULL,                               /* holder for compiled pattern flags */    PCRE_CASELESS|PCRE_DOTALL|PCRE_MULTILINE,     /* compile flags */    CONTENT_RELATIVE|CONTENT_BUF_RAW     /* content flags */};static RuleOption rule13718option2 ={    OPTION_TYPE_PCRE,    {        &rule13718pcre2    }};// content:"|0A|", relative; static ContentInfo rule13718content3 = {    (u_int8_t *) "|0A|", /* pattern (now in snort content format) */    0, /* depth */    0, /* offset */    CONTENT_RELATIVE|CONTENT_BUF_RAW, /* flags */ // XXX - need to add CONTENT_FAST_PATTERN support    NULL, /* holder for boyer/moore PTR */    NULL, /* more holder info - byteform */    0, /* byteform length */    0 /* increment length*/};static RuleOption rule13718option3 = {    OPTION_TYPE_CONTENT,    {        &rule13718content3    }};// pcre:"^(QUIT|RSET|BDAT)", relative, nocase;static PCREInfo rule13718pcre4 ={    "^(QUIT|RSET|BDAT)", /* pattern */    NULL,                               /* holder for compiled pattern */    NULL,                               /* holder for compiled pattern flags */    PCRE_CASELESS,     /* compile flags */    CONTENT_RELATIVE|CONTENT_BUF_RAW     /* content flags */};static RuleOption rule13718option4 ={    OPTION_TYPE_PCRE,    {        &rule13718pcre4    }};/* references for sid 13718 *//* reference: bugtraq "4204"; */static RuleReference rule13718ref1 = {    "bugtraq", /* type */    "4204" /* value */};/* reference: cve "2002-0055"; */static RuleReference rule13718ref2 = {    "cve", /* type */    "2002-0055" /* value */};/* reference: url "www.microsoft.com/technet/security/bulletin/ms02-012.mspx"; */static RuleReference rule13718ref3 = {    "url", /* type */    "www.microsoft.com/technet/security/bulletin/ms02-012.mspx" /* value */};static RuleReference *rule13718refs[] ={    &rule13718ref1,    &rule13718ref2,    &rule13718ref3,    NULL};#ifdef HAS_METADATA/* metadata for sid 13718 *//* metadata:policy security-ips drop; */static RuleMetaData rule13718policy1 = {    "policy security-ips drop"};static RuleMetaData rule13718policy2 ={    "service smtp"};static RuleMetaData *rule13718metadata[] ={    &rule13718policy1,    &rule13718policy2,    NULL};#endifRuleOption *rule13718options[] ={    &rule13718option0,    &rule13718option1,    &rule13718option2,    &rule13718option3,    &rule13718option4,    NULL};Rule rule13718 = {      /* rule header, akin to => tcp any any -> any any               */{       IPPROTO_TCP, /* proto */       "$EXTERNAL_NET", /* SRCIP     */       "any", /* SRCPORT   */       1, /* DIRECTION */       "$HOME_NET", /* DSTIP     */       "25", /* DSTPORT   */   },   /* metadata */   {        3,  /* genid (HARDCODED!!!) */       13718, /* sigid */       1, /* revision */          "attempted-admin", /* classification */       0,  /* hardcoded priority XXX NOT PROVIDED BY GRAMMAR YET! */       "SMTP BDAT buffer overflow attempt",     /* message */       rule13718refs /* ptr to references */   #ifdef HAS_METADATA       ,rule13718metadata   #endif   },   rule13718options, /* ptr to rule options */   &rule13718eval, /* DOES NOT use the built in detection function */   0 /* am I initialized yet? */};/* detection functions */int rule13718eval(void *p) {    const u_int8_t *cursor_normal = 0;    SFSnortPacket *sp = (SFSnortPacket *) p;    const u_int8_t *end_of_payload;    char byte_array[6], *parse_helper;    unsigned int i, chunklen;    if(sp == NULL)        return RULE_NOMATCH;    if(sp->payload == NULL)        return RULE_NOMATCH;    end_of_payload = sp->payload + sp->payload_size;    // flow:established, to_server;    if (checkFlow(p, rule13718options[0]->option_u.flowFlags) <= 0 )        return RULE_NOMATCH;    // we never check our "BDAT" content match because it's a repeat of our pcre and by    // definition it exists since we passed the fast pattern matcher.            // Set the cursor to the beginning of the packet so our relative PCRE works    cursor_normal = sp->payload;    // pcre:"^\s*BDAT\s+", dotall, multiline, nocase;    while(pcreMatch(p, rule13718options[2]->option_u.pcre, &cursor_normal) > 0) {       // extract the size       if(cursor_normal + 5 >= end_of_payload)          return RULE_NOMATCH;       // Cursor should be pointing at the length field if this is a valid chunk        for(i=0;i<5; i++)       {          byte_array[i] = *(cursor_normal+i);       }       byte_array[5] = '\0';       chunklen = strtoul(byte_array, &parse_helper, 10);       if(byte_array == parse_helper) /* no valid digits */          continue;                   /* try to find a valid chunk */       // verify the size isn't bigger than we can possibly verify (3k bytes total)       if(chunklen > 2900)          return RULE_NOMATCH;       // now look for the end of the line       // content:"|0A|", relative;       if(contentMatch(p, rule13718options[3]->option_u.content, &cursor_normal) <= 0)          return RULE_NOMATCH;       // now add the size to the cursor and check for next command       cursor_normal += chunklen;       // This seems fragile, but our original assumption that the bdat block ends with \r\n       // does not seem correct.  What does seem correct based upon RFC1830 and live data is       // that the block is followed by another command.  The sane followers are QUIT, RSET,       // and another BDAT (for multipart BDAT blocks).       if(cursor_normal + 4 >= end_of_payload) // verify size to avoid false positives          return RULE_NOMATCH;       // pcre:"^(QUIT|RSET|BDAT)", relative, nocase;       if(pcreMatch(p, rule13718options[4]->option_u.pcre, &cursor_normal) <= 0)           return RULE_MATCH;    }    return RULE_NOMATCH;}/*Rule *rules[] = {    &rule13718,    NULL};*/

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久er精品视频| 欧美日韩免费一区二区三区视频| 欧美电影免费提供在线观看| 亚洲女与黑人做爰| 色av一区二区| 日韩精品电影在线| 欧美一区二视频| 精品一区二区三区免费观看 | 中文字幕佐山爱一区二区免费| eeuss鲁一区二区三区| 五月天一区二区三区| 91精品国产综合久久久久久| 全部av―极品视觉盛宴亚洲| 久久久久久电影| 99re热视频这里只精品| 亚洲大片精品永久免费| 精品毛片乱码1区2区3区| 经典三级视频一区| 亚洲欧洲性图库| 欧美日韩大陆在线| 久久99精品国产.久久久久久| 国产欧美精品日韩区二区麻豆天美 | 91蜜桃传媒精品久久久一区二区| 樱花影视一区二区| 欧美绝品在线观看成人午夜影视| 国产麻豆日韩欧美久久| 亚洲欧洲国产专区| 这里只有精品电影| 成人免费毛片嘿嘿连载视频| 亚洲一区二区视频在线观看| 欧美xxxx在线观看| 94色蜜桃网一区二区三区| 性感美女极品91精品| 精品成人一区二区三区| 99久久精品费精品国产一区二区| 日韩精品每日更新| 国产精品视频麻豆| 3751色影院一区二区三区| 人人精品人人爱| 国产精品日韩成人| 日韩美女在线视频| 91精品福利视频| 国产电影一区在线| 日韩电影一区二区三区| 国产精品久久久久一区二区三区 | 91免费精品国自产拍在线不卡| 亚洲欧美另类图片小说| 日韩欧美一级特黄在线播放| 91小视频在线| 国产风韵犹存在线视精品| 日韩高清在线观看| 中文字幕综合网| 久久尤物电影视频在线观看| 欧美午夜精品电影| 成人精品免费看| 日韩高清不卡在线| 一区二区欧美视频| 亚洲日本中文字幕区| 国产亚洲欧美色| 欧美伦理影视网| eeuss鲁片一区二区三区在线看| 日本伊人精品一区二区三区观看方式| 亚洲欧美日韩国产综合在线| 中文字幕欧美三区| 日韩欧美一卡二卡| 91精品国产高清一区二区三区| 一本色道久久综合亚洲精品按摩| 日本欧美一区二区| 天涯成人国产亚洲精品一区av| 久久精品一二三| 日韩精品中文字幕在线不卡尤物| 欧美酷刑日本凌虐凌虐| 7777女厕盗摄久久久| 欧美性色黄大片| 国产成人鲁色资源国产91色综 | 国产精品激情偷乱一区二区∴| 欧美疯狂性受xxxxx喷水图片| 色婷婷精品久久二区二区蜜臂av| 成人晚上爱看视频| 国产成人在线观看免费网站| 国模无码大尺度一区二区三区| 国模套图日韩精品一区二区| 激情综合色综合久久综合| 蜜臀久久99精品久久久久宅男| 日日夜夜精品免费视频| 三级成人在线视频| 日本女优在线视频一区二区 | 国产一区视频在线看| 亚洲国产日韩综合久久精品| 国产色综合久久| 久久精品视频在线看| 国产欧美一区二区在线观看| 精品国产91乱码一区二区三区 | 久久久亚洲国产美女国产盗摄| 26uuu亚洲| 日韩欧美中文字幕一区| 欧美一级片在线| 欧美精品三级日韩久久| 成人h版在线观看| 精品一区二区三区av| 亚洲电影你懂得| 亚洲乱码国产乱码精品精小说 | 制服.丝袜.亚洲.中文.综合| 日韩免费高清电影| 国产精品视频免费| 精品99一区二区| 中文字幕欧美一| 亚洲小说欧美激情另类| 卡一卡二国产精品| 成人小视频免费观看| 欧美色区777第一页| 日韩欧美一级精品久久| 中文字幕不卡三区| 午夜电影久久久| 美日韩一级片在线观看| 国产精华液一区二区三区| 欧日韩精品视频| 久久久精品人体av艺术| 亚洲一区二区三区视频在线| 韩国女主播成人在线| 日本韩国欧美在线| 精品剧情v国产在线观看在线| 中文字幕色av一区二区三区| 蜜臀av一区二区三区| 91色在线porny| 精品国产123| 久久精品亚洲乱码伦伦中文| 亚洲二区在线视频| 国产精品自产自拍| 91精品久久久久久蜜臀| 国产精品福利电影一区二区三区四区 | 国产一区欧美日韩| 欧美亚洲动漫制服丝袜| 久久久国产精华| 亚洲成在线观看| 成人av网在线| 精品国产免费一区二区三区四区| 亚洲国产综合在线| 国产成人精品1024| 日韩一区二区三区av| 一区免费观看视频| 国产一区二区精品久久99| 欧美日韩精品三区| 亚洲精品中文字幕乱码三区| 国产成人午夜电影网| 91 com成人网| 国产日产欧产精品推荐色| 国产精品伦一区二区三级视频| 亚洲福利视频三区| 最新欧美精品一区二区三区| 成人性生交大合| 久久久久久99精品| 亚洲va天堂va国产va久| 欧美在线你懂得| 日韩一区二区免费高清| 日韩精品1区2区3区| 美女脱光内衣内裤视频久久网站| 91亚洲永久精品| 综合自拍亚洲综合图不卡区| 欧美aaaaaa午夜精品| 欧美一级生活片| 亚洲欧美国产77777| 色婷婷综合中文久久一本| 337p日本欧洲亚洲大胆精品| 日本视频一区二区三区| 99久久国产免费看| 亚洲猫色日本管| 久久综合色一综合色88| 日韩av二区在线播放| 欧美一区二区三区视频| 中文天堂在线一区| 丁香天五香天堂综合| 日韩一区二区三区高清免费看看| 青青草国产精品97视觉盛宴| www.日韩av| 亚洲欧洲99久久| 国产一区二区三区日韩| 日本一区二区动态图| 成人av网在线| 国产日韩av一区| av资源网一区| 国产日产精品1区| 色婷婷精品久久二区二区蜜臂av| 91 com成人网| 国产很黄免费观看久久| 国产精品不卡视频| 成人福利电影精品一区二区在线观看| 自拍偷拍亚洲综合| 99久久精品免费看国产| 亚洲综合自拍偷拍| 97久久精品人人做人人爽| 午夜久久电影网| 2023国产精品| 美女国产一区二区三区| 中文子幕无线码一区tr| 国产成人免费视| 午夜欧美视频在线观看| 欧美日韩小视频| 国产精品亚洲视频| 尤物视频一区二区|