?? 1446.txt
字號:
Rule:--Sid:1446--Summary:This event is generated when an external attacker uses the "vrfy root"command to find the login name or mail alias of the systemadministrator. This may also indicate a vulnerability scan.--Impact:Information gathering. --Detailed Information:An attacker may be able to obtain the email alias or actual emailaddress of root users. This allows the attacker to know which emailaccounts may be more valuable to target, and can be used by spammers oras targets for denial of service attempts.--Affected Systems:Systems running Sendmail.--Attack Scenarios:An attacker uses vrfy root to obtain the name of administrators on theserver. The attacker now knows which accounts have administrativeaccess, and may use this information to focus later attacks.--Ease of Attack:Simple.--False Positives:None known.--False Negatives:None known.--Corrective Action:Disable the vrfy command on your mail server, or update your Sendmailconfiguration file so that Sendmail displays non-sensitive informationwhen it receives a vrfy root request.--Contributors:Original rule written by Brian Caswell <bmc@sourcefire.com>Sourcefire Research TeamSourcefire Technical Publications TeamJen Harvey <jennifer.harvey@sourcefire.com>--Additional References:RFC 821:http://www.faqs.org/rfcs/rfc821.htmlSecurity Space:http://www.securityspace.com/smysecure/catid.html?viewsrc=1&id=10249--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -