McAfee M-1250 IPS Configuration Guide - Page 254

Remote Access, Read Exposure

Page 254 highlights

McAfee® Network Security Platform 5.1 Understanding attack descriptions Category Description Privileged Access Privileged access indicates the most serious type of successful exploitation, where unauthorized access to privileged accounts has been obtained. For example, a successful buffer overflow on a Unix server may open a root shell for the attacker. Alternatively, the attacker may have achieved successful privilege elevation from a legitimate user account, or from a remote access compromise. Privileged access allows the attacker to potentially take complete control of the compromised system. Probe Probes of specific service or host, typically based on specially constructed packets, for example unusual flag settings. Protocol Violation Unusual application protocol behaviors, including invalid field values or invalid command sequences, and so forth. Read Exposure With a successful attack, this suggests that a breach of confidentiality has occurred. Examples include directory traversal, dump of file content such as CGI script, or read of other sensitive data files such as password and database records. Remote Access Remote access indicates a potentially successful exploitation where unauthorized access has been obtained. For example, a successful buffer overflow on a Windows server may open a Windows command shell for the attacker. The remote access does not have to be for a privileged user to begin with, but an attacker may be able to perform further attacks to achieve privilege elevation once remote access is obtained. Restricted Access Any activities related to using any network resources that are explicitly forbidden. For example emails to/from particular addresses and browsing of specific URLs. Restricted Application Any activities related to running network applications that are forbidden by policy. Examples include running an IRC or music share server on the corporate network without authorization. Sensitive Content Any content keyword matches that are deemed to indicate transmission of sensitive information, for example document with "Company Confidential" marking. Shellcode Execution This kind of alert indicates the most severe form of buffer overflow attacks, that is, a buffer overflow attack carrying shellcode payload. Shellcode is a general term used for a piece of executable code that, upon successful execution on the target system, will modify the target's configuration or behavior for malicious purposes. Statistical Deviation Indicates that a significant change was detected in the packet rate for a particular traffic measure. For example, if in your normal flow of traffic, TCP SYN packets make up between 23-28% of the traffic, then a short-term measure of TCP SYN traffic at 40% may indicate a DoS attack. 246

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
Understanding attack descriptions
246
Category
Description
Privileged Access
Privileged access indicates the most serious type of
successful exploitation, where unauthorized access to
privileged accounts has been obtained. For example, a
successful buffer overflow on a Unix server may open a root
shell for the attacker. Alternatively, the attacker may have
achieved successful privilege elevation from a legitimate
user account, or from a remote access compromise.
Privileged access allows the attacker to potentially take
complete control of the compromised system.
Probe
Probes of specific service or host, typically based on
specially constructed packets, for example unusual flag
settings.
Protocol Violation
Unusual application protocol behaviors, including invalid field
values or invalid command sequences, and so forth.
Read Exposure
With a successful attack, this suggests that a breach of
confidentiality has occurred. Examples include directory
traversal, dump of file content such as CGI script, or read of
other sensitive data files such as password and database
records.
Remote Access
Remote access indicates a potentially successful
exploitation where unauthorized access has been obtained.
For example, a successful buffer overflow on a Windows
server may open a Windows command shell for the attacker.
The remote access does not have to be for a privileged user
to begin with, but an attacker may be able to perform further
attacks to achieve privilege elevation once remote access is
obtained.
Restricted Access
Any activities related to using any network resources that are
explicitly forbidden. For example emails to/from particular
addresses and browsing of specific URLs.
Restricted
Application
Any activities related to running network applications that are
forbidden by policy. Examples include running an IRC or
music share server on the corporate network without
authorization.
Sensitive Content
Any content keyword matches that are deemed to indicate
transmission of sensitive information, for example document
with “Company Confidential” marking.
Shellcode
Execution
This kind of alert indicates the most severe form of buffer
overflow attacks, that is, a buffer overflow attack carrying
shellcode payload. Shellcode is a general term used for a
piece of executable code that, upon successful execution on
the target system, will modify the target's configuration or
behavior for malicious purposes.
Statistical
Deviation
Indicates that a significant change was detected in the
packet rate for a particular traffic measure. For example, if in
your normal flow of traffic, TCP SYN packets make up
between 23-28% of the traffic, then a short-term measure of
TCP SYN traffic at 40% may indicate a DoS attack.