'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-11-04 | |
| Rule Name: | Scanner Gr33k Detection | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | Gr33k is a Python and PyQt-based graphical penetration testing tool that integrates multiple exploit modules, brute-force dictionaries, and auxiliary scripts, and can be used for security testing and vulnerability research. This rule detects scanning characteristics of Gr33k. | |
| Impact: | Attackers use scanners to scan targets, may find vulnerabilities in the target system, resulting in system information leakage, and then attack the system to obtain system permissions. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| 1. If it is determined that there is scanning behavior from an unknown IP address, it is recommended to block the IP address immediately. 2. Make sure that the file system permissions of Web servers and applications are set properly to limit access to sensitive files and directories. 3. Ensure that the system and applications have been updated to the latest version, and fix known vulnerabilities to reduce the impact on the system. |