File: 1383.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (63 lines) | stat: -rw-r--r-- 1,228 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
Rule:

--
Sid:
1383

--
Summary:
This event is generated when activity by Peer-to-Peer (p2p) clients is 
detected.

--
Impact:
Informational event. Unauthorized use of a p2p client may be in 
progress.

--
Detailed Information:
This event indicates that use of a p2p client has been detected. This 
may be against corporate policy. p2p clients connect to other p2p 
clients to share files, commonly music and video files but can be 
configured to share any file on the local machine.

This activity may not only use bandwidth but may also be used to 
transfer company confidential information to unauthorized hosts external
to the protected network bypassing other security measures in place.

--
Affected Systems:
Any host using a p2p client.

--
Attack Scenarios:
This is indicative of the use of a p2p client.

--
Ease of Attack:
Simple.

--
False Positives:
Any HTTP GET request to a port associated with a p2p application may
generate a false positive event.

--
False Negatives:
None known.

--
Corrective Action:
Check the host and uninstall any p2p client found.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--