Attack objects can bind to applications and services in different ways:
|
Before You Begin |
|---|
|
For background information, read: |
Whether the specified application or service binding applies or not depends on the complete attack object definition as well as the IDP policy configuration:
Table 111: Applications and Services with Application Identification
For example in the following attack object definition, the attack object binds to the application HTTP, the application identification is enabled, and the service field SMTP is ignored.
: (“http-test”
:application (“http”)
:service (“smtp”)
:rectype (signature)
:signature (
:pattern (“.*TERM=xterm; export TERM=xterm; exec bash – i\x0a\x.*”)
:type (stream)
)
:type (attack-ip)
)
Table 112: Application Configuration in an IDP Policy