亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? exploit.rules

?? This is the snapshot of Snot Latest Rules
?? RULES
?? 第 1 頁 / 共 5 頁
字號:
# Copyright 2001-2005 Sourcefire, Inc. All Rights Reserved## This file may contain proprietary rules that were created, tested and# certified by Sourcefire, Inc. (the "VRT Certified Rules") as well as# rules that were created by Sourcefire and other third parties and# distributed under the GNU General Public License (the "GPL Rules").  The# VRT Certified Rules contained in this file are the property of# Sourcefire, Inc. Copyright 2005 Sourcefire, Inc. All Rights Reserved.# The GPL Rules created by Sourcefire, Inc. are the property of# Sourcefire, Inc. Copyright 2002-2005 Sourcefire, Inc. All Rights# Reserved.  All other GPL Rules are owned and copyrighted by their# respective owners (please see www.snort.org/contributors for a list of# owners and their respective copyrights).  In order to determine what# rules are VRT Certified Rules or GPL Rules, please refer to the VRT# Certified Rules License Agreement.### $Id: exploit.rules,v 1.116.6.34 2008/07/22 17:59:06 vrtbuild Exp $#--------------# EXPLOIT RULES#--------------alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow /bin/sh"; flow:to_server,established; content:"/bin/sh"; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-0572; classtype:shellcode-detect; sid:1324; rev:8;)# alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow filler"; flow:to_server,established; content:"|00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00|"; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-0572; classtype:shellcode-detect; sid:1325; rev:6;)alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow NOOP"; flow:to_server,established; content:"|90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90|"; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-0572; classtype:shellcode-detect; sid:1326; rev:8;)alert tcp $EXTERNAL_NET any -> $HOME_NET 22 (msg:"EXPLOIT ssh CRC32 overflow"; flow:to_server,established; content:"|00 01|W|00 00 00 18|"; depth:7; content:"|FF FF FF FF 00 00|"; depth:14; offset:8; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,2347; reference:cve,2001-0144; reference:cve,2001-0572; reference:nessus,10607; classtype:shellcode-detect; sid:1327; rev:10;)alert tcp $EXTERNAL_NET 80 -> $HOME_NET any (msg:"EXPLOIT Netscape 4.7 client overflow"; flow:to_client,established; content:"3|C9 B1 10|?|E9 06|Q<|FA|G3|C0|P|F7 D0|P"; reference:arachnids,215; reference:bugtraq,822; reference:cve,1999-1189; reference:cve,2000-1187; classtype:attempted-user; sid:283; rev:10;)alert tcp $EXTERNAL_NET any -> $HOME_NET 2766 (msg:"EXPLOIT nlps x86 Solaris overflow"; flow:to_server,established; content:"|EB 23|^3|C0 88|F|FA 89|F|F5 89|6"; reference:bugtraq,2319; classtype:attempted-admin; sid:300; rev:7;)alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"EXPLOIT LPRng overflow"; flow:to_server,established; content:"C|07 89|[|08 8D|K|08 89|C|0C B0 0B CD 80|1|C0 FE C0 CD 80 E8 94 FF FF FF|/bin/sh|0A|"; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,1712; reference:cve,2000-0917; classtype:attempted-admin; sid:301; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 515 (msg:"EXPLOIT Redhat 7.0 lprd overflow"; flow:to_server,established; content:"XXXX%.172u%300|24|n"; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,1712; reference:cve,2000-0917; classtype:attempted-admin; sid:302; rev:11;)alert tcp $EXTERNAL_NET any -> $HOME_NET 6373 (msg:"EXPLOIT SCO calserver overflow"; flow:to_server,established; content:"|EB 7F|]U|FE|M|98 FE|M|9B|"; reference:bugtraq,2353; reference:cve,2000-0306; classtype:attempted-admin; sid:304; rev:9;)alert tcp $EXTERNAL_NET any -> $HOME_NET 8080 (msg:"EXPLOIT delegate proxy overflow"; flow:to_server,established; isdataat:1000; content:"whois|3A|//"; nocase; reference:arachnids,267; reference:bugtraq,808; reference:cve,2000-0165; classtype:attempted-admin; sid:305; rev:11;)alert tcp $EXTERNAL_NET any -> $HOME_NET 9090 (msg:"EXPLOIT VQServer admin"; flow:to_server,established; content:"GET / HTTP/1.1"; nocase; reference:bugtraq,1610; reference:cve,2000-0766; reference:nessus,10354; reference:url,www.vqsoft.com/vq/server/docs/other/control.html; classtype:attempted-admin; sid:306; rev:10;)alert tcp $EXTERNAL_NET 21 -> $HOME_NET any (msg:"EXPLOIT NextFTP client overflow"; flow:to_client,established; content:"|B4| |B4|!|8B CC 83 E9 04 8B 19|3|C9|f|B9 10|"; metadata:policy balanced-ips drop, policy security-ips drop; reference:bugtraq,572; reference:cve,1999-0671; classtype:attempted-user; sid:308; rev:10;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"EXPLOIT sniffit overflow"; flow:stateless; dsize:>512; flags:A+; content:"from|3A 90 90 90 90 90 90 90 90 90 90 90|"; nocase; reference:arachnids,273; reference:bugtraq,1158; reference:cve,2000-0343; classtype:attempted-admin; sid:309; rev:10;)alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:"EXPLOIT x86 windows MailMax overflow"; flow:to_server,established; content:"|EB|E|EB| [|FC|3|C9 B1 82 8B F3 80|+"; reference:bugtraq,2312; reference:cve,1999-0404; classtype:attempted-admin; sid:310; rev:8;)alert tcp $HOME_NET any -> $EXTERNAL_NET 80 (msg:"EXPLOIT Netscape 4.7 unsucessful overflow"; flow:to_server,established; content:"3|C9 B1 10|?|E9 06|Q<|FA|G3|C0|P|F7 D0|P"; reference:arachnids,214; reference:bugtraq,822; reference:cve,1999-1189; reference:cve,2000-1187; classtype:unsuccessful-user; sid:311; rev:11;)alert udp $EXTERNAL_NET any -> $HOME_NET 123 (msg:"EXPLOIT ntpdx overflow attempt"; flow:to_server; dsize:>128; reference:arachnids,492; reference:bugtraq,2540; reference:cve,2001-0414; reference:nessus,10647; classtype:attempted-admin; sid:312; rev:8;)alert udp $EXTERNAL_NET any -> $HOME_NET 518 (msg:"EXPLOIT ntalkd x86 Linux overflow"; flow:to_server; content:"|01 03 00 00 00 00 00 01 00 02 02 E8|"; reference:bugtraq,210; classtype:attempted-admin; sid:313; rev:5;)alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"EXPLOIT x86 Linux mountd overflow"; flow:to_server; content:"^|B0 02 89 06 FE C8 89|F|04 B0 06 89|F"; reference:bugtraq,121; reference:cve,1999-0002; classtype:attempted-admin; sid:315; rev:7;)alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"EXPLOIT x86 Linux mountd overflow"; flow:to_server; content:"|EB|V^VVV1|D2 88|V|0B 88|V|1E|"; reference:bugtraq,121; reference:cve,1999-0002; classtype:attempted-admin; sid:316; rev:7;)alert udp $EXTERNAL_NET any -> $HOME_NET 635 (msg:"EXPLOIT x86 Linux mountd overflow"; flow:to_server; content:"|EB|@^1|C0|@|89|F|04 89 C3|@|89 06|"; reference:bugtraq,121; reference:cve,1999-0002; classtype:attempted-admin; sid:317; rev:7;)alert tcp $EXTERNAL_NET any -> $HOME_NET 2224 (msg:"EXPLOIT MDBMS overflow"; flow:to_server,established; content:"|01|1|DB CD 80 E8|[|FF FF FF|"; reference:bugtraq,1252; reference:cve,2000-0446; reference:nessus,10422; classtype:attempted-admin; sid:1240; rev:6;)alert tcp $EXTERNAL_NET any -> $HOME_NET 4242 (msg:"EXPLOIT AIX pdnsd overflow"; flow:to_server,established; isdataat:1000; content:"|7F FF FB|x|7F FF FB|x|7F FF FB|x|7F FF FB|x"; content:"@|8A FF C8|@|82 FF D8 3B|6|FE 03 3B|v|FE 02|"; reference:bugtraq,3237; reference:bugtraq,590; reference:cve,1999-0745; classtype:attempted-user; sid:1261; rev:12;)

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲精品在线观| 亚洲乱码国产乱码精品精98午夜| 国产激情视频一区二区在线观看| 久久综合九色综合97_久久久| 国产剧情一区在线| 国产精品久久久久久久午夜片 | 成人理论电影网| 一区在线中文字幕| 欧美三级日韩三级国产三级| 蜜桃av噜噜一区二区三区小说| 精品国产乱子伦一区| 成人爽a毛片一区二区免费| 亚洲天堂2016| 69堂精品视频| 国产91精品露脸国语对白| 最新不卡av在线| 欧美久久久久免费| 国产一区二区三区美女| 亚洲人xxxx| 亚洲成人免费看| 欧美mv和日韩mv的网站| 成人污污视频在线观看| 亚洲成人综合网站| 久久精品一区八戒影视| 色综合天天视频在线观看 | 蜜桃免费网站一区二区三区 | 精品国产一区二区三区久久影院 | 久久99国产精品久久99果冻传媒| 欧美国产欧美综合| 欧美一a一片一级一片| 久久精品国内一区二区三区| 中文字幕欧美国产| 欧美蜜桃一区二区三区| 国产精品影视网| 一区二区三区高清不卡| 精品卡一卡二卡三卡四在线| 色婷婷综合在线| 久久成人羞羞网站| 亚洲久本草在线中文字幕| 欧美一级在线视频| 99久久婷婷国产综合精品| 青青草原综合久久大伊人精品| 日本一区二区高清| 欧美日本在线看| k8久久久一区二区三区| 青草av.久久免费一区| 国产精品久久影院| 欧美本精品男人aⅴ天堂| 91久久一区二区| 精品一区二区三区在线播放| 亚洲图片欧美色图| 久久久久久久久一| 欧美日韩一级二级三级| 成人精品视频一区二区三区| 青青草一区二区三区| 亚洲裸体在线观看| 久久综合久久久久88| 欧美日韩国产123区| 成人动漫在线一区| 老司机午夜精品99久久| 一区二区三区精品视频| 国产精品进线69影院| 亚洲精品一区在线观看| 欧美久久久久久久久中文字幕| av电影天堂一区二区在线观看| 精品亚洲porn| 午夜精品爽啪视频| 亚洲靠逼com| 国产精品久久看| 国产亚洲综合性久久久影院| 欧美一区二区三区思思人| 91成人免费网站| 不卡的av电影| 国产黄色91视频| 免费观看成人鲁鲁鲁鲁鲁视频| 一区二区高清免费观看影视大全 | 精品久久一区二区| 欧美日韩综合在线| 91丝袜高跟美女视频| 国产盗摄精品一区二区三区在线| 久久精品久久99精品久久| 三级久久三级久久| 亚洲中国最大av网站| 中文字幕一区二区三区不卡| 国产欧美视频在线观看| 欧美videossexotv100| 欧美一区二区三区啪啪| 欧美日韩一区在线| 91国产福利在线| 色综合久久久久综合99| gogo大胆日本视频一区| 国产精品一区二区视频| 韩国成人精品a∨在线观看| 日韩av不卡一区二区| 亚洲电影一区二区三区| 亚洲激情校园春色| 亚洲麻豆国产自偷在线| 亚洲精品视频观看| 亚洲精品免费视频| 亚洲欧美偷拍卡通变态| 综合精品久久久| 成人免费视频在线观看| 亚洲欧洲www| 中文字幕一区二区三区不卡| 国产精品久久久久久久裸模| 国产精品久久久久久久岛一牛影视 | 国产精品一卡二卡在线观看| 极品少妇一区二区| 韩国成人精品a∨在线观看| 国产一区欧美日韩| 国产一区欧美一区| 国产成人aaa| 成人app下载| 99视频在线精品| 97精品久久久久中文字幕| 91免费看`日韩一区二区| 91在线精品一区二区| 99国产欧美久久久精品| 色噜噜久久综合| 欧美私人免费视频| 91精品国产乱码久久蜜臀| 日韩免费一区二区| 国产日韩欧美精品一区| 国产精品人成在线观看免费| **性色生活片久久毛片| 亚洲精品第1页| 五月婷婷久久丁香| 美女国产一区二区| 国产在线观看免费一区| 国产精品456| 91在线看国产| 欧美日韩一区二区三区高清| 欧美一区二区视频在线观看 | 国产精品电影一区二区| 亚洲乱码中文字幕| 午夜久久久影院| 久久精品国产一区二区三| 国产精品一级在线| 一本大道久久精品懂色aⅴ| 欧美午夜精品理论片a级按摩| 7777精品伊人久久久大香线蕉完整版 | 波多野结衣亚洲| 在线视频一区二区三| 欧美一区二区三区在线看| 国产午夜精品一区二区三区嫩草 | 69av一区二区三区| 亚洲精品一区二区三区影院| 国产精品久久久久一区| 丝袜亚洲另类丝袜在线| 国产成人综合在线观看| 色哟哟国产精品| 精品美女一区二区| 成人免费一区二区三区视频 | 日本欧美大码aⅴ在线播放| 国产成人高清视频| 在线亚洲一区观看| 精品少妇一区二区三区免费观看| 中文字幕av一区二区三区高| 亚洲高清免费一级二级三级| 国产精品一级片在线观看| 欧洲在线/亚洲| 精品免费一区二区三区| 亚洲精品乱码久久久久| 韩国女主播一区二区三区| 色婷婷av久久久久久久| 26uuu另类欧美| 一区二区三区中文字幕| 韩国女主播成人在线| 在线日韩一区二区| wwwwxxxxx欧美| 亚洲第一综合色| 成人一道本在线| 8x8x8国产精品| 亚洲欧美福利一区二区| 国产麻豆一精品一av一免费| 欧美体内she精高潮| 欧美激情艳妇裸体舞| 日韩不卡一区二区三区| 91在线观看美女| 2023国产精华国产精品| 亚洲国产欧美一区二区三区丁香婷| 国产999精品久久久久久绿帽| 3d成人h动漫网站入口| 亚洲乱码中文字幕综合| 国产成人av一区二区| 91 com成人网| 夜夜爽夜夜爽精品视频| 成人精品在线视频观看| 欧美刺激午夜性久久久久久久| 亚洲另类色综合网站| 懂色av噜噜一区二区三区av| 日韩一区二区三区电影在线观看 | 洋洋成人永久网站入口| 国产成人av一区二区三区在线观看| 日韩一区二区三区免费看| 亚洲一二三专区| 97久久人人超碰| 国产亚洲欧美日韩俺去了| 美女任你摸久久| 欧美日韩不卡视频|