亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? mysql.rules

?? This is the snapshot of Snot Latest Rules
?? RULES
字號:
# Copyright 2001-2005 Sourcefire, Inc. All Rights Reserved## This file may contain proprietary rules that were created, tested and# certified by Sourcefire, Inc. (the "VRT Certified Rules") as well as# rules that were created by Sourcefire and other third parties and# distributed under the GNU General Public License (the "GPL Rules").  The# VRT Certified Rules contained in this file are the property of# Sourcefire, Inc. Copyright 2005 Sourcefire, Inc. All Rights Reserved.# The GPL Rules created by Sourcefire, Inc. are the property of# Sourcefire, Inc. Copyright 2002-2005 Sourcefire, Inc. All Rights# Reserved.  All other GPL Rules are owned and copyrighted by their# respective owners (please see www.snort.org/contributors for a list of# owners and their respective copyrights).  In order to determine what# rules are VRT Certified Rules or GPL Rules, please refer to the VRT# Certified Rules License Agreement.### $Id: mysql.rules,v 1.23.6.6 2008/04/22 20:53:19 vrtbuild Exp $#----------# MYSQL RULES#----------## These signatures detect unusual and potentially malicious mysql traffic.## These signatures are not enabled by default as they may generate false# positive alarms on networks that do mysql development.#alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL root login attempt"; flow:to_server,established; content:"|0A 00 00 01 85 04 00 00 80|root|00|"; metadata:service mysql; classtype:protocol-command-decode; sid:1775; rev:3;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL show databases attempt"; flow:to_server,established; content:"|0F 00 00 00 03|show databases"; metadata:service mysql; classtype:protocol-command-decode; sid:1776; rev:3;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL 4.0 root login attempt"; flow:to_server,established; content:"|01|"; depth:1; offset:3; content:"root|00|"; within:5; distance:5; nocase; metadata:service mysql; classtype:protocol-command-decode; sid:3456; rev:4;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL CREATE FUNCTION attempt"; flow:to_server,established; content:"|03|create"; offset:4; nocase; pcre:"/\x03create\s+(aggregate\s+)*function/smi"; metadata:service mysql; reference:bugtraq,12781; reference:cve,2005-0709; classtype:misc-activity; sid:3528; rev:3;)alert tcp $SQL_SERVERS 3306 -> $EXTERNAL_NET any (msg:"MYSQL server greeting"; flow:from_server,established; content:"|00|"; depth:1; offset:3; flowbits:set,mysql.server_greeting; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:attempted-user; sid:3665; rev:6;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL protocol 41 secure client overflow attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,&,0x80,4; byte_test:1,&,0x02,4; content:"|00 14|"; offset:36; isdataat:74,relative; content:!"|00|"; within:74; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3669; rev:6;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL client authentication bypass attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,&,0x80,4; byte_test:1,!&,0x02,4; content:"|00 14 00|"; offset:9; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3668; rev:8;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL client overflow attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,!&,0x80,4; byte_test:1,!&,0x02,4; content:"|00|"; offset:9; isdataat:74,relative; content:!"|00|"; within:74; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3672; rev:6;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL secure client overflow attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,&,0x80,4; byte_test:1,!&,0x02,4; content:"|00 14|"; offset:9; isdataat:74,relative; content:!"|00|"; within:74; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3670; rev:6;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL protocol 41 client authentication bypass attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,&,0x80,4; byte_test:1,&,0x02,4; content:"|00 14 00|"; offset:36; metadata:policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3667; rev:6;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL protocol 41 client overflow attempt"; flow:to_server,established; flowbits:isset,mysql.server_greeting; content:"|01|"; depth:1; offset:3; byte_test:1,!&,0x80,4; byte_test:1,&,0x02,4; content:"|00|"; offset:36; isdataat:74,relative; content:!"|00|"; within:74; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:misc-attack; sid:3671; rev:6;)alert tcp $SQL_SERVERS 3306 -> $EXTERNAL_NET any (msg:"MYSQL server greeting finished"; flow:from_server,established; byte_test:1,>,0,3; flowbits:isset,mysql.server_greeting; flowbits:unset,mysql.server_greeting; flowbits:noalert; metadata:policy balanced-ips drop, policy connectivity-ips drop, policy security-ips drop, service mysql; reference:bugtraq,10655; reference:cve,2004-0627; reference:nessus,12639; reference:url,www.nextgenss.com/advisories/mysql-authbypass.txt; classtype:attempted-user; sid:3666; rev:8;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL CREATE FUNCTION buffer overflow attempt"; flow:to_server,established; content:"|03|create"; offset:4; nocase; pcre:"/\x03create\s+(aggregate\s+)*function\s+\S{50}/smi"; metadata:service mysql; reference:bugtraq,14509; reference:cve,2005-2558; classtype:misc-activity; sid:4649; rev:2;)alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 3306 (msg:"MYSQL Date_Format denial of service attempt"; flow:to_server,established; content:"DATE_FORMAT"; pcre:"/DATE_FORMAT\x28\s*(\x22[^\x22]+\x25[^\x22]*\x22|\x27[^\x27]+\x25[^\x27]*\x27)/smi"; metadata:service mysql; reference:bugtraq,19032; reference:cve,2006-3469; reference:url,dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html; classtype:attempted-dos; sid:8057; rev:2;)alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"MYSQL yaSSL SSLv2 Client Hello Message Cipher Length Buffer Overflow attempt"; flow:established, to_server; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,tlsv1.server_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01|"; depth:1; offset:2; byte_test:2,>,64,5; content:!"|01|"; depth:1; offset:5; content:!"|03 01|"; depth:2; offset:9; flowbits:set,sslv2.client_hello.request; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; reference:bugtraq,27140; reference:cve,2008-0226; reference:url,bugs.mysql.com/bug.php?id=33814; classtype:attempted-user; sid:13711; rev:1;)alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"MYSQL yaSSL SSLv2 Client Hello Message Session ID Buffer Overflow attempt"; flow:established, to_server; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,tlsv1.server_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01|"; depth:1; offset:2; byte_test:2,>,32,7; content:!"|01|"; depth:1; offset:5; content:!"|03 01|"; depth:2; offset:9; flowbits:set,sslv2.client_hello.request; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; reference:bugtraq,27140; reference:cve,2008-0226; reference:url,bugs.mysql.com/bug.php?id=33814; classtype:attempted-user; sid:13712; rev:1;)alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"MYSQL yaSSL SSLv3 Client Hello Message Cipher Specs Buffer Overflow attempt"; flow:established, to_server; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,tlsv1.server_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|16 03 01|"; depth:3; content:"|01|"; depth:1; offset:5; content:"|03 01|"; depth:2; offset:9; byte_jump:1,43; byte_test:2,>,64,0,relative; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; reference:bugtraq,27140; reference:cve,2008-0226; reference:url,bugs.mysql.com/bug.php?id=33814; classtype:attempted-user; sid:13714; rev:1;)alert tcp $HOME_NET 3306 -> $EXTERNAL_NET any (msg:"MYSQL yaSSL TLSv1 Server_Hello request"; flow:to_client,established; flowbits:isset,tlsv1.client_hello.request; content:"|16 03 01|"; depth:3; content:"|02|"; depth:1; offset:5; flowbits:set,tlsv1.server_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; classtype:protocol-command-decode; sid:13710; rev:1;)alert tcp $HOME_NET 3306 -> $EXTERNAL_NET any (msg:"MYSQL yaSSL SSLv2 Server_Hello request"; flow:from_server,established; flowbits:isset,sslv2.client_hello.request; content:"|04|"; depth:1; offset:2; content:"|00 02|"; depth:2; offset:5; flowbits:set,sslv2.server_hello.request; flowbits:noalert; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; classtype:protocol-command-decode; sid:13709; rev:1;)alert tcp $EXTERNAL_NET any -> $HOME_NET 3306 (msg:"MYSQL yaSSL SSLv2 Client Hello Message Challenge Buffer Overflow attempt"; flow:established, to_server; flowbits:isnotset,sslv2.server_hello.request; flowbits:isnotset,tlsv1.server_hello.request; flowbits:isnotset,tlsv1.client_hello.request; content:"|01|"; depth:1; offset:2; byte_test:2,>,32,9; content:!"|01|"; depth:1; offset:5; content:!"|03 01|"; depth:2; offset:9; flowbits:set,sslv2.client_hello.request; metadata:policy balanced-ips drop, policy security-ips drop, service mysql; reference:bugtraq,27140; reference:cve,2008-0226; reference:url,bugs.mysql.com/bug.php?id=33814; classtype:attempted-user; sid:13713; rev:1;)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产专区欧美精品| 免费亚洲电影在线| 欧美亚洲国产怡红院影院| 亚洲精品久久嫩草网站秘色| 94-欧美-setu| 亚洲制服丝袜在线| 91精品国产综合久久精品| 精品一区二区三区的国产在线播放 | 中文字幕乱码亚洲精品一区| 成人av网站在线观看免费| 亚洲欧美日韩中文播放| 欧美午夜理伦三级在线观看| 毛片av中文字幕一区二区| 国产亚洲欧洲一区高清在线观看| 丁香桃色午夜亚洲一区二区三区| 中文字幕日本不卡| 欧美视频在线不卡| 国产精品正在播放| 一区二区视频在线| 日韩欧美卡一卡二| 波多野结衣欧美| 亚洲成人你懂的| 精品88久久久久88久久久 | 色综合久久综合中文综合网| 午夜久久电影网| 国产丝袜美腿一区二区三区| 色8久久人人97超碰香蕉987| 日韩精品成人一区二区三区| 亚洲国产高清不卡| 777午夜精品免费视频| 国产成人久久精品77777最新版本| 亚洲精品少妇30p| 欧美xingq一区二区| 91丨九色porny丨蝌蚪| 美女免费视频一区二区| 亚洲日本在线天堂| 欧美大片国产精品| 欧美亚洲国产一卡| 成人午夜大片免费观看| 青青青爽久久午夜综合久久午夜 | 99re亚洲国产精品| 蜜臀久久99精品久久久画质超高清| 中文字幕av一区二区三区| 欧美一区二区在线不卡| 91欧美激情一区二区三区成人| 久久成人免费电影| 亚洲大片在线观看| 1区2区3区国产精品| 精品1区2区在线观看| 欧美视频在线观看一区二区| 成人av在线观| 国产一区二区三区在线观看免费视频 | 激情欧美日韩一区二区| 亚洲一区二区三区不卡国产欧美| 国产视频视频一区| 欧美不卡一区二区| 欧美高清你懂得| 91久久精品一区二区三| av动漫一区二区| 国产成人一级电影| 国产美女av一区二区三区| 日本美女一区二区三区| 午夜精品福利一区二区三区蜜桃| 亚洲免费色视频| 国产精品家庭影院| 欧美国产日韩亚洲一区| 久久久久综合网| 精品国产乱码久久久久久图片| 欧美二区在线观看| 欧美日韩一卡二卡| 欧美性猛交xxxx黑人交| 色菇凉天天综合网| 91色视频在线| a美女胸又www黄视频久久| 成人动漫一区二区在线| 成人午夜短视频| 成人动漫一区二区| 99久久精品免费观看| 91美女视频网站| 色综合天天视频在线观看| 91同城在线观看| 色悠悠亚洲一区二区| 在线观看www91| 色婷婷狠狠综合| 欧美精品九九99久久| 在线不卡免费欧美| 日韩欧美在线影院| 26uuu国产一区二区三区 | 国产欧美一区二区三区在线看蜜臀| 久久亚洲捆绑美女| 国产精品久久二区二区| 一区二区三区日韩在线观看| 一区二区三区电影在线播| 亚洲国产成人高清精品| 日本91福利区| 国产一区二区伦理片| 懂色av一区二区在线播放| 91免费在线视频观看| 欧美午夜精品久久久| 日韩一区二区三区四区五区六区| 精品成人免费观看| 亚洲欧美影音先锋| 亚洲国产wwwccc36天堂| 久热成人在线视频| www.欧美.com| 欧美日韩你懂得| 精品国产麻豆免费人成网站| 国产精品欧美一级免费| 亚洲第一二三四区| 国产伦精品一区二区三区免费迷| 97精品久久久久中文字幕 | 久久成人18免费观看| 国产成a人亚洲| 精品污污网站免费看| 久久久99精品免费观看不卡| 亚洲欧美一区二区三区国产精品| 图片区小说区国产精品视频| 国产尤物一区二区在线| 91久久线看在观草草青青| 精品国产自在久精品国产| 亚洲欧美日韩在线播放| 美女视频网站黄色亚洲| 91猫先生在线| 日韩欧美成人午夜| 日韩伦理电影网| 黑人巨大精品欧美一区| 在线视频亚洲一区| 久久久久99精品国产片| 亚洲成人福利片| 成人免费毛片嘿嘿连载视频| 7777女厕盗摄久久久| 17c精品麻豆一区二区免费| 免播放器亚洲一区| 91精品福利视频| 国产欧美一区二区三区鸳鸯浴| 午夜精品福利一区二区三区av| 不卡av在线免费观看| 欧美mv日韩mv国产网站app| 亚洲精品成人少妇| 成人午夜在线免费| 久久综合九色综合97婷婷女人 | 欧美二区三区91| 亚洲综合视频网| 99免费精品在线观看| 久久久久97国产精华液好用吗| 日韩成人免费看| 欧美系列亚洲系列| 亚洲特级片在线| 成人免费av资源| 久久久久成人黄色影片| 精品一区免费av| 欧美一区二区三区在线看| 亚洲综合精品自拍| 色婷婷一区二区| 亚洲精品国产品国语在线app| 国产精品99久久久久久久vr| 日韩色在线观看| 日韩av不卡在线观看| 777午夜精品视频在线播放| 亚洲综合久久av| 欧美三级在线看| 香蕉影视欧美成人| 欧美视频在线观看一区二区| 亚洲一区二区免费视频| 欧美三级电影精品| 亚洲成av人片观看| 欧美精三区欧美精三区| 亚洲成人中文在线| 欧美日韩精品一区二区三区| 一区二区三区成人在线视频| 欧美在线一区二区| 亚洲成人av福利| 欧美疯狂做受xxxx富婆| 日韩精品一二三| 欧美不卡一区二区三区四区| 精品亚洲成a人在线观看| 精品精品国产高清一毛片一天堂| 久久精品久久精品| 国产日韩高清在线| 99精品国产91久久久久久| 最新久久zyz资源站| 色综合激情五月| 午夜欧美大尺度福利影院在线看| 欧美猛男gaygay网站| 奇米888四色在线精品| 欧美v亚洲v综合ⅴ国产v| 国产99久久久久久免费看农村| 国产精品欧美经典| 欧美性感一类影片在线播放| 男男gaygay亚洲| 337p日本欧洲亚洲大胆精品| 国产.欧美.日韩| 亚洲精品美国一| 日韩免费看的电影| 国产精品123区| 一二三四社区欧美黄| 欧美成人精品1314www| www.日韩在线| 日韩黄色免费网站| 久久综合成人精品亚洲另类欧美|