亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? imap.rules

?? This is the snapshot of Snot Latest Rules
?? RULES
?? 第 1 頁 / 共 2 頁
字號:
# Copyright 2001-2005 Sourcefire, Inc. All Rights Reserved## This file may contain proprietary rules that were created, tested and# certified by Sourcefire, Inc. (the "VRT Certified Rules") as well as# rules that were created by Sourcefire and other third parties and# distributed under the GNU General Public License (the "GPL Rules").  The# VRT Certified Rules contained in this file are the property of# Sourcefire, Inc. Copyright 2005 Sourcefire, Inc. All Rights Reserved.# The GPL Rules created by Sourcefire, Inc. are the property of# Sourcefire, Inc. Copyright 2002-2005 Sourcefire, Inc. All Rights# Reserved.  All other GPL Rules are owned and copyrighted by their# respective owners (please see www.snort.org/contributors for a list of# owners and their respective copyrights).  In order to determine what# rules are VRT Certified Rules or GPL Rules, please refer to the VRT# Certified Rules License Agreement.### $Id: imap.rules,v 1.48.6.11 2008/04/22 20:53:19 vrtbuild Exp $#--------------# IMAP RULES#--------------alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login literal buffer overflow attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s[^\n]*?\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,21724; reference:bugtraq,6298; reference:cve,2002-1580; reference:cve,2006-6424; reference:nessus,12532; classtype:misc-attack; sid:1993; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login buffer overflow attempt"; flow:established,to_server; content:"LOGIN"; isdataat:100,relative; pcre:"/\sLOGIN\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,13727; reference:bugtraq,21110; reference:bugtraq,502; reference:cve,1999-0005; reference:cve,1999-1557; reference:cve,2005-1255; reference:cve,2006-5961; reference:cve,2007-2795; reference:nessus,10123; reference:nessus,10125; classtype:attempted-user; sid:1842; rev:20;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login format string attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s[^\n]*?%/smi"; metadata:service imap; reference:bugtraq,10976; classtype:attempted-admin; sid:2664; rev:4;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login literal format string attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s\w+\s\{\d+\}[\r]?\n[^\n]*?%/smi"; metadata:service imap; reference:bugtraq,10976; reference:cve,2007-0221; reference:url,www.microsoft.com/technet/security/Bulletin/MS07-026.mspx; classtype:attempted-admin; sid:2665; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP authenticate literal overflow attempt"; flow:established,to_server; content:"AUTHENTICATE"; nocase; pcre:"/\sAUTHENTICATE\s[^\n]*?\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,21724; reference:cve,1999-0042; reference:cve,2006-6424; reference:nessus,10292; classtype:misc-attack; sid:2105; rev:8;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP authenticate overflow attempt"; flow:established,to_server; content:"AUTHENTICATE"; nocase; isdataat:100,relative; pcre:"/\sAUTHENTICATE\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,12995; reference:bugtraq,130; reference:cve,1999-0005; reference:cve,1999-0042; reference:nessus,10292; classtype:misc-attack; sid:1844; rev:15;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP delete overflow attempt"; flow:established,to_server; content:"DELETE"; nocase; isdataat:100,relative; pcre:"/\sDELETE\s[^\n]{100}/smi"; metadata:service imap; reference:bugtraq,11675; reference:cve,2004-1520; reference:nessus,15771; classtype:misc-attack; sid:3007; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP delete literal overflow attempt"; flow:established,to_server; content:"DELETE"; nocase; pcre:"/\sDELETE\s[^\n]*?\{/smi"; byte_test:5,>,100,0,string,dec,relative; metadata:service imap; reference:bugtraq,11675; reference:cve,2004-1520; reference:nessus,15771; classtype:misc-attack; sid:3008; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP copy literal overflow attempt"; flow:established,to_server; content:"COPY"; nocase; pcre:"/\sCOPY\s[^\n]*?\{/smi"; byte_test:5,>,1024,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:3058; rev:7;)# auth is an imap2 function and only accepts literal usagealert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP auth literal overflow attempt"; flow:established,to_server; content:"AUTH"; nocase; pcre:"/({(?=\d+}[^\n]*?\sAUTH)|AUTH\s[^\n]*?{(?=\d+}))/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,21724; reference:cve,1999-0005; reference:cve,2006-6424; classtype:misc-attack; sid:1930; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP auth overflow attempt"; flow:established,to_server; content:"AUTH"; nocase; pcre:"/AUTH\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,8861; reference:cve,2003-1177; reference:nessus,11910; classtype:misc-attack; sid:2330; rev:7;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP lsub literal overflow attempt"; flow:to_server,established; content:"LSUB"; nocase; pcre:"/\sLSUB\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1902; rev:13;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP lsub overflow attempt"; flow:to_server,established; content:"LSUB"; isdataat:100,relative; pcre:"/\sLSUB\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2106; rev:11;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP list literal overflow attempt"; flow:established,to_server; content:"LIST"; nocase; pcre:"/\sLIST\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1845; rev:19;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP list overflow attempt"; flow:established,to_server; content:"LIST"; nocase; isdataat:100,relative; pcre:"/\sLIST\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2118; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP rename literal overflow attempt"; flow:established,to_server; content:"RENAME"; nocase; pcre:"/\sRENAME\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2119; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP rename overflow attempt"; flow:established,to_server; content:"RENAME"; nocase; isdataat:100,relative; pcre:"/\sRENAME\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1903; rev:12;)# FIND does not accept a literal commandalert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP find overflow attempt"; flow:established,to_server; content:"FIND"; nocase; isdataat:100,relative; pcre:"/^\sFIND\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1904; rev:12;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP partial body buffer overflow attempt"; flow:to_server,established; content:"PARTIAL"; nocase; content:"BODY["; distance:0; nocase; pcre:"/\sPARTIAL.*BODY\[[^\]]{1024}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966; classtype:misc-attack; sid:1755; rev:19;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP partial body.peek buffer overflow attempt"; flow:to_server,established; content:"PARTIAL"; nocase; content:"BODY.PEEK["; distance:0; nocase; pcre:"/\sPARTIAL.*BODY\.PEEK\[[^\]]{1024}/smi"; metadata:service imap; reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966; classtype:misc-attack; sid:2046; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP create buffer overflow attempt"; flow:to_server,established; content:"CREATE"; isdataat:1024,relative; pcre:"/\sCREATE\s[^\n]{1024}/smi"; metadata:service imap; reference:bugtraq,7446; classtype:misc-attack; sid:2107; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP create literal buffer overflow attempt"; flow:to_server,established; content:"CREATE"; nocase; pcre:"/\sCREATE\s*\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,7446; classtype:misc-attack; sid:2120; rev:5;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login brute force attempt"; flow:to_server,established; content:"LOGIN"; nocase; threshold:type threshold, track by_dst, count 30, seconds 30; metadata:service imap; classtype:suspicious-login; sid:2273; rev:4;)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
中文字幕一区二区三区四区| 99久久精品免费观看| 久久精品一区二区三区不卡| 久久综合中文字幕| 国产精品美女久久久久久久久久久 | 国产一区二区主播在线| 亚洲最新视频在线播放| 久久9热精品视频| 精品一区二区免费视频| 国产精品灌醉下药二区| 欧美性色aⅴ视频一区日韩精品| 一区二区三区在线高清| 久久精品欧美一区二区三区不卡 | 日韩三级在线观看| 国产成人亚洲综合色影视| 成人免费看黄yyy456| 国产精品毛片无遮挡高清| 国产精品自拍在线| 亚洲视频1区2区| 欧美性受xxxx| 精品一区二区三区久久久| 国产日韩欧美麻豆| 色综合天天综合色综合av| 亚洲成人免费看| 精品福利一二区| av亚洲产国偷v产偷v自拍| 亚洲综合一区二区三区| 日韩视频免费观看高清完整版在线观看| 久久精品国产澳门| 欧美国产精品专区| 欧美日韩国产大片| 国产精品一区在线观看乱码| 亚洲精品一二三四区| 日韩一区和二区| fc2成人免费人成在线观看播放| 亚洲国产精品久久久久秋霞影院| 欧美大片拔萝卜| 91丨porny丨首页| 麻豆免费看一区二区三区| 1000部国产精品成人观看| 欧美福利视频导航| 成人免费av资源| 日本vs亚洲vs韩国一区三区| 亚洲欧美在线视频观看| 日韩亚洲欧美一区二区三区| 99视频精品全部免费在线| 男女性色大片免费观看一区二区 | 中文字幕中文字幕在线一区 | 99久久精品免费| 麻豆传媒一区二区三区| 亚洲另类春色校园小说| 久久久99久久精品欧美| 欧美图区在线视频| 成人毛片视频在线观看| 久久精品国产在热久久| 一区二区免费看| 欧美国产精品一区二区| 日韩欧美国产一区二区三区| 欧美伊人久久大香线蕉综合69| 国产精品99久久久久久似苏梦涵 | 亚洲图片欧美综合| 国产精品成人网| 国产婷婷色一区二区三区四区 | 欧美精品日日鲁夜夜添| 成人av资源下载| 狠狠色狠狠色综合| 日韩国产一区二| 亚洲综合另类小说| 亚洲欧美日韩在线| 中文字幕在线不卡国产视频| 国产亚洲1区2区3区| 精品免费国产二区三区| 91精品麻豆日日躁夜夜躁| 在线日韩一区二区| 欧美日韩一区二区在线观看| 久久精品视频一区| 91一区二区三区在线播放| 天使萌一区二区三区免费观看| 日本一区二区久久| 在线观看不卡一区| 国产精品一二三四区| 亚洲国产sm捆绑调教视频| 久久久国际精品| 欧美日韩一区二区三区不卡| 国产夫妻精品视频| 美国欧美日韩国产在线播放| 国产精品久久久一本精品| 欧美日韩成人综合在线一区二区| 国产在线播放一区二区三区| 亚洲女同一区二区| 亚洲成人精品在线观看| 亚洲欧美另类小说视频| 日韩国产欧美一区二区三区| 亚洲欧洲精品一区二区三区不卡| 成人av片在线观看| 亚洲美女屁股眼交3| 老司机免费视频一区二区| 欧美三级视频在线观看| 亚洲电影在线免费观看| 亚洲在线观看免费| 免费三级欧美电影| 国产精品正在播放| 一本色道a无线码一区v| 欧美吞精做爰啪啪高潮| 日韩欧美区一区二| 中文字幕av不卡| 亚洲一级二级三级| 久久99国产精品尤物| 国产精品99久久久久久似苏梦涵| 成人激情校园春色| 精品污污网站免费看| 日韩精品一区二区三区四区视频| 国产精品网站在线| 中文字幕一区二区三区在线不卡| 亚洲午夜三级在线| 激情五月激情综合网| a亚洲天堂av| 欧美区在线观看| 国产亚洲欧美激情| 亚洲成av人影院| 麻豆精品久久久| 色哟哟一区二区| 日韩免费在线观看| 亚洲欧洲韩国日本视频| 青草av.久久免费一区| www.综合网.com| 欧美一区二区免费| 亚洲欧洲精品成人久久奇米网| 青青草精品视频| 国产一区二区伦理片| 色吧成人激情小说| 久久蜜臀中文字幕| 亚洲午夜国产一区99re久久| 国产成人午夜电影网| 欧美私人免费视频| 欧美高清在线一区| 久久精品国产亚洲一区二区三区| 色噜噜狠狠成人网p站| 国产日韩欧美制服另类| 亚洲成人av福利| 色综合久久综合中文综合网| 久久久久久**毛片大全| 日韩高清中文字幕一区| 色婷婷av一区二区三区大白胸 | 亚洲视频在线一区| 久久精品国产精品亚洲综合| 色婷婷av一区二区三区大白胸 | 日韩美女天天操| 亚洲综合成人网| 91亚洲午夜精品久久久久久| 26uuu亚洲综合色欧美| 天天av天天翘天天综合网| 99国产精品久久久久久久久久久| 日韩美女视频一区二区在线观看| 亚洲精品欧美激情| 大胆欧美人体老妇| 久久精品视频一区二区三区| 久久精品99国产精品| 日韩一区二区三区观看| 亚洲福利国产精品| 91小视频免费看| 中文字幕一区在线| 国产大陆亚洲精品国产| 日韩欧美亚洲另类制服综合在线| 亚洲一区二区视频在线| 色吊一区二区三区| 亚洲综合一二区| 欧美自拍偷拍午夜视频| 中文字幕一区二区三区四区不卡| 成人网页在线观看| 欧美午夜理伦三级在线观看| 成人精品视频一区二区三区| 国产乱理伦片在线观看夜一区| 日韩亚洲欧美在线| 五月婷婷久久丁香| 91麻豆精品国产91久久久资源速度 | 亚洲欧洲日韩女同| 成人av在线看| 亚洲色图在线看| 欧美性感一类影片在线播放| 亚洲va欧美va国产va天堂影院| 欧美浪妇xxxx高跟鞋交| 丁香网亚洲国际| 亚洲1区2区3区4区| 国产精品国产三级国产aⅴ无密码| 欧美性猛交xxxx乱大交退制版| 在线看日本不卡| 国产精品久久久久久福利一牛影视 | 成人欧美一区二区三区视频网页| 欧美午夜精品一区| 91亚洲精品乱码久久久久久蜜桃| 亚洲h在线观看| 1000部国产精品成人观看| 精品va天堂亚洲国产| 欧美精选一区二区| 色狠狠色狠狠综合| 在线观看免费成人| 91在线免费播放| 欧美一三区三区四区免费在线看 | 欧美喷潮久久久xxxxx|