Attack objects can bind to applications and services in different ways:
|
Before You Begin |
|---|
|
For background information, read: |
Whether the specified application or service binding applies or not depends on the complete attack object definition as well as the IDP policy configuration:
Table 108: Applications and Services with Application Identification
For example in the following attack object definition, the attack object binds to the application HTTP, the application identification is enabled, and the service field SMTP is ignored.
: (“http-test”
:application (“http”)
:service (“smtp”)
:rectype (signature)
:signature (
:pattern (“.*TERM=xterm; export TERM=xterm; exec bash – i\x0a\x.*”)
:type (stream)
)
:type (attack-ip)
)
Table 109: Application Configuration in an IDP Policy