'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2022-07-28 | |
| Rule Name: | Sensitive File /etc/passwd Access Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | By acquiring key sensitive information, an attacker can further harm the target of infiltration. Under Linux, etcpasswd is a file that records the basic attributes of each user, which can be modified by the system administrator to manage the user. This rule is used to detect suspicious behavior that attempts to obtain /etc/passwd information. | |
| Impact: | By obtaining sensitive files or directories, an attacker can obtain critical system information and cause other harm to the target. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| 1. Ensure that file system permissions on the Web server and applications are properly set to limit access to sensitive files and directories. 2. Check the access records of the system for unauthorized access. 3. Ensure that systems and applications are updated to the latest version and fix known vulnerabilities to minimize system impact. |