亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? imap.rules

?? This is the snapshot of Snot Latest Rules
?? RULES
?? 第 1 頁 / 共 2 頁
字號:
# Copyright 2001-2005 Sourcefire, Inc. All Rights Reserved## This file may contain proprietary rules that were created, tested and# certified by Sourcefire, Inc. (the "VRT Certified Rules") as well as# rules that were created by Sourcefire and other third parties and# distributed under the GNU General Public License (the "GPL Rules").  The# VRT Certified Rules contained in this file are the property of# Sourcefire, Inc. Copyright 2005 Sourcefire, Inc. All Rights Reserved.# The GPL Rules created by Sourcefire, Inc. are the property of# Sourcefire, Inc. Copyright 2002-2005 Sourcefire, Inc. All Rights# Reserved.  All other GPL Rules are owned and copyrighted by their# respective owners (please see www.snort.org/contributors for a list of# owners and their respective copyrights).  In order to determine what# rules are VRT Certified Rules or GPL Rules, please refer to the VRT# Certified Rules License Agreement.### $Id: imap.rules,v 1.48.6.11 2008/04/22 20:53:19 vrtbuild Exp $#--------------# IMAP RULES#--------------alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login literal buffer overflow attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s[^\n]*?\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,21724; reference:bugtraq,6298; reference:cve,2002-1580; reference:cve,2006-6424; reference:nessus,12532; classtype:misc-attack; sid:1993; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login buffer overflow attempt"; flow:established,to_server; content:"LOGIN"; isdataat:100,relative; pcre:"/\sLOGIN\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,13727; reference:bugtraq,21110; reference:bugtraq,502; reference:cve,1999-0005; reference:cve,1999-1557; reference:cve,2005-1255; reference:cve,2006-5961; reference:cve,2007-2795; reference:nessus,10123; reference:nessus,10125; classtype:attempted-user; sid:1842; rev:20;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login format string attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s[^\n]*?%/smi"; metadata:service imap; reference:bugtraq,10976; classtype:attempted-admin; sid:2664; rev:4;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login literal format string attempt"; flow:established,to_server; content:"LOGIN"; nocase; pcre:"/\sLOGIN\s\w+\s\{\d+\}[\r]?\n[^\n]*?%/smi"; metadata:service imap; reference:bugtraq,10976; reference:cve,2007-0221; reference:url,www.microsoft.com/technet/security/Bulletin/MS07-026.mspx; classtype:attempted-admin; sid:2665; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP authenticate literal overflow attempt"; flow:established,to_server; content:"AUTHENTICATE"; nocase; pcre:"/\sAUTHENTICATE\s[^\n]*?\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,21724; reference:cve,1999-0042; reference:cve,2006-6424; reference:nessus,10292; classtype:misc-attack; sid:2105; rev:8;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP authenticate overflow attempt"; flow:established,to_server; content:"AUTHENTICATE"; nocase; isdataat:100,relative; pcre:"/\sAUTHENTICATE\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,12995; reference:bugtraq,130; reference:cve,1999-0005; reference:cve,1999-0042; reference:nessus,10292; classtype:misc-attack; sid:1844; rev:15;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP delete overflow attempt"; flow:established,to_server; content:"DELETE"; nocase; isdataat:100,relative; pcre:"/\sDELETE\s[^\n]{100}/smi"; metadata:service imap; reference:bugtraq,11675; reference:cve,2004-1520; reference:nessus,15771; classtype:misc-attack; sid:3007; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP delete literal overflow attempt"; flow:established,to_server; content:"DELETE"; nocase; pcre:"/\sDELETE\s[^\n]*?\{/smi"; byte_test:5,>,100,0,string,dec,relative; metadata:service imap; reference:bugtraq,11675; reference:cve,2004-1520; reference:nessus,15771; classtype:misc-attack; sid:3008; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP copy literal overflow attempt"; flow:established,to_server; content:"COPY"; nocase; pcre:"/\sCOPY\s[^\n]*?\{/smi"; byte_test:5,>,1024,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:3058; rev:7;)# auth is an imap2 function and only accepts literal usagealert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP auth literal overflow attempt"; flow:established,to_server; content:"AUTH"; nocase; pcre:"/({(?=\d+}[^\n]*?\sAUTH)|AUTH\s[^\n]*?{(?=\d+}))/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,21724; reference:cve,1999-0005; reference:cve,2006-6424; classtype:misc-attack; sid:1930; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP auth overflow attempt"; flow:established,to_server; content:"AUTH"; nocase; pcre:"/AUTH\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,8861; reference:cve,2003-1177; reference:nessus,11910; classtype:misc-attack; sid:2330; rev:7;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP lsub literal overflow attempt"; flow:to_server,established; content:"LSUB"; nocase; pcre:"/\sLSUB\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1902; rev:13;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP lsub overflow attempt"; flow:to_server,established; content:"LSUB"; isdataat:100,relative; pcre:"/\sLSUB\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2106; rev:11;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP list literal overflow attempt"; flow:established,to_server; content:"LIST"; nocase; pcre:"/\sLIST\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1845; rev:19;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP list overflow attempt"; flow:established,to_server; content:"LIST"; nocase; isdataat:100,relative; pcre:"/\sLIST\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2118; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP rename literal overflow attempt"; flow:established,to_server; content:"RENAME"; nocase; pcre:"/\sRENAME\s[^\n]*?\s\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:2119; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP rename overflow attempt"; flow:established,to_server; content:"RENAME"; nocase; isdataat:100,relative; pcre:"/\sRENAME\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1903; rev:12;)# FIND does not accept a literal commandalert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP find overflow attempt"; flow:established,to_server; content:"FIND"; nocase; isdataat:100,relative; pcre:"/^\sFIND\s[^\n]{100}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,1110; reference:cve,2000-0284; reference:nessus,10374; classtype:misc-attack; sid:1904; rev:12;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP partial body buffer overflow attempt"; flow:to_server,established; content:"PARTIAL"; nocase; content:"BODY["; distance:0; nocase; pcre:"/\sPARTIAL.*BODY\[[^\]]{1024}/smi"; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service imap; reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966; classtype:misc-attack; sid:1755; rev:19;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP partial body.peek buffer overflow attempt"; flow:to_server,established; content:"PARTIAL"; nocase; content:"BODY.PEEK["; distance:0; nocase; pcre:"/\sPARTIAL.*BODY\.PEEK\[[^\]]{1024}/smi"; metadata:service imap; reference:bugtraq,4713; reference:cve,2002-0379; reference:nessus,10966; classtype:misc-attack; sid:2046; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP create buffer overflow attempt"; flow:to_server,established; content:"CREATE"; isdataat:1024,relative; pcre:"/\sCREATE\s[^\n]{1024}/smi"; metadata:service imap; reference:bugtraq,7446; classtype:misc-attack; sid:2107; rev:5;)alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP create literal buffer overflow attempt"; flow:to_server,established; content:"CREATE"; nocase; pcre:"/\sCREATE\s*\{/smi"; byte_test:5,>,256,0,string,dec,relative; metadata:service imap; reference:bugtraq,7446; classtype:misc-attack; sid:2120; rev:5;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 143 (msg:"IMAP login brute force attempt"; flow:to_server,established; content:"LOGIN"; nocase; threshold:type threshold, track by_dst, count 30, seconds 30; metadata:service imap; classtype:suspicious-login; sid:2273; rev:4;)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美一级久久久久久久大片| 成人激情av网| 日韩欧美自拍偷拍| 日韩精品成人一区二区三区| 欧美精品在线一区二区| 日韩av电影天堂| www国产亚洲精品久久麻豆| 国内精品久久久久影院色| 久久中文字幕电影| 不卡的av在线| 亚洲国产综合人成综合网站| 日韩一区二区三区观看| 国产传媒久久文化传媒| 国产精品久久久久久妇女6080| 色美美综合视频| 香蕉久久一区二区不卡无毒影院| 日韩欧美高清一区| 99在线热播精品免费| 亚洲午夜三级在线| 精品第一国产综合精品aⅴ| 国产成人精品免费| 亚洲精品乱码久久久久久日本蜜臀| 欧美伊人久久大香线蕉综合69| 日本不卡视频在线| 中文字幕二三区不卡| 在线观看成人小视频| 日韩av中文字幕一区二区三区| 久久久一区二区三区| 91丝袜美腿高跟国产极品老师| 亚洲综合在线免费观看| 精品国产乱码久久久久久免费| 成人国产精品免费| 毛片基地黄久久久久久天堂| 中文字幕一区二区三区精华液 | 久久久久高清精品| 色综合一个色综合| 精品亚洲国内自在自线福利| 一区二区在线免费| 精品国产1区2区3区| 欧美羞羞免费网站| 成人精品免费视频| 免费成人在线网站| 夜夜爽夜夜爽精品视频| 欧美国产成人精品| 91精品国产入口在线| 色综合一个色综合亚洲| 韩国av一区二区三区| 亚洲18女电影在线观看| 国产精品久久久久久久蜜臀| 欧美videos大乳护士334| 日本丰满少妇一区二区三区| 国产白丝网站精品污在线入口| 蜜桃视频一区二区| 亚洲成在人线在线播放| 一色屋精品亚洲香蕉网站| 久久亚洲免费视频| 91精品国产一区二区人妖| 在线日韩一区二区| 一本到一区二区三区| 成人动漫视频在线| 国产精品99久久久久久似苏梦涵| 日本欧美韩国一区三区| 亚洲午夜激情av| 伊人色综合久久天天| 中文字幕日本乱码精品影院| 国产日产欧美一区| 国产婷婷色一区二区三区在线| 精品国产伦一区二区三区免费 | 91影视在线播放| 久久国产夜色精品鲁鲁99| 亚洲国产wwwccc36天堂| 亚洲午夜免费视频| 一区二区三区四区在线播放| 亚洲视频狠狠干| 日韩有码一区二区三区| 亚洲成av人片在线| 丝袜诱惑制服诱惑色一区在线观看| 亚洲精品福利视频网站| 亚洲狼人国产精品| 玉米视频成人免费看| 亚洲综合一区二区三区| 亚洲综合视频网| 偷拍日韩校园综合在线| 日韩黄色免费网站| 蜜乳av一区二区三区| 美女免费视频一区二区| 经典三级视频一区| 懂色av噜噜一区二区三区av| 成人av影视在线观看| 99这里都是精品| 在线视频一区二区三区| 欧美浪妇xxxx高跟鞋交| 日韩一本二本av| 久久久亚洲高清| 中文字幕一区在线观看| 一区二区免费视频| 蜜臀va亚洲va欧美va天堂 | 91麻豆精品国产自产在线| 8x8x8国产精品| 日韩美女视频在线| wwww国产精品欧美| 国产精品色哟哟| 一区二区不卡在线播放| 日韩电影一二三区| 国产成人在线影院| 色综合天天综合给合国产| 欧美日韩国产美女| 久久人人97超碰com| 亚洲视频 欧洲视频| 视频一区二区不卡| 国产成人亚洲精品狼色在线 | 丁香亚洲综合激情啪啪综合| 93久久精品日日躁夜夜躁欧美| 在线观看免费亚洲| 26uuu欧美| 一区二区三区在线视频观看 | 国产成人无遮挡在线视频| 国产精品一区二区免费不卡| 97久久人人超碰| 欧美成人精精品一区二区频| 国产拍揄自揄精品视频麻豆| 国产精品色呦呦| 亚洲成人综合在线| 国产成人精品一区二| 日本韩国精品在线| 午夜电影久久久| 最新热久久免费视频| 欧美在线免费播放| 91福利在线免费观看| 日韩欧美亚洲一区二区| 国产精品国产三级国产三级人妇| 日韩av在线发布| 欧美视频一区在线观看| 国产精品婷婷午夜在线观看| 亚洲6080在线| 不卡欧美aaaaa| 久久久久久久久久电影| 亚洲丰满少妇videoshd| 成人午夜短视频| 精品国产乱码久久久久久浪潮 | 亚洲永久免费视频| 国产乱码精品一区二区三| 69久久夜色精品国产69蝌蚪网| 亚洲精品免费在线| 粉嫩一区二区三区在线看| 精品粉嫩aⅴ一区二区三区四区| 国产乱码一区二区三区| 宅男在线国产精品| 亚洲国产日日夜夜| 91免费视频网址| 中文字幕乱码日本亚洲一区二区 | 国产一区二区美女诱惑| 在线不卡的av| 亚洲不卡一区二区三区| eeuss鲁片一区二区三区在线看| 久久久一区二区| 精品一区二区在线观看| 日韩情涩欧美日韩视频| 首页亚洲欧美制服丝腿| 欧美日韩综合在线| 曰韩精品一区二区| 91美女在线看| 亚洲天堂精品在线观看| 成人免费不卡视频| 国产精品美女一区二区三区 | 欧洲亚洲精品在线| 亚洲另类色综合网站| 91日韩在线专区| 亚洲男人都懂的| 欧美影视一区二区三区| 一区二区三区高清| 欧美日韩在线免费视频| 水野朝阳av一区二区三区| 欧美一区二区网站| 成人精品免费看| 日韩综合小视频| 中文字幕永久在线不卡| 日韩一卡二卡三卡四卡| 成人性生交大片免费看中文网站| 亚洲精品国产视频| 精品国产精品网麻豆系列| 91影视在线播放| 国产一区二区美女| 亚洲第一激情av| 久久久久国色av免费看影院| 欧美巨大另类极品videosbest| 国产成人免费视频一区| 免费成人在线网站| 亚洲一区成人在线| 亚洲影视资源网| 国产精品美女久久久久aⅴ| 欧美男女性生活在线直播观看| 欧美一区二区视频在线观看2020| 91成人在线免费观看| 久久嫩草精品久久久精品一| 久久久一区二区三区捆绑**| 337p亚洲精品色噜噜狠狠| 成人免费高清在线| 麻豆精品一区二区三区| 韩国在线一区二区|