From the options below, choose the exploit against which this rule applies.

Study the snort rule given below:

From the options below, choose the exploit against which this rule applies.

Study the snort rule given below:

From the options below, choose the exploit against which this rule applies.

A.
WebDav

B.
SQL Slammer

C.
MS Blaster

D.
MyDoom

Explanation:
MS Blaster scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. TCP ports 139 and 445 may also provide attack vectors.



Leave a Reply 0

Your email address will not be published. Required fields are marked *