Previous Topic: Port Scan ActionNext Topic: Protocol Exploit Action


Possible Brute Force Attack Action

The action Possible Brute Force Attack deals with activities that indicate a possibility f Brute Force Attack.

Information

Level

Source - User Information

Tertiary

Source - Host Information

Primary

Source - Object Information

Primary

Source - Process Information

Tertiary

Source - Group Information

Tertiary

Dest - User Information

Secondary

Dest - Host Information

Primary

Dest - Object Information

Tertiary

Dest - Process Information

Tertiary

Dest - Group Information

Tertiary

Agent - Information

Primary

Agent - Host Information

Primary

Event Source - Host Information

Primary

Event Source - Information

Tertiary

Event - Information

Primary

Result - Information

Primary

Result

event_result

event_severity

Success

S

5

Failure

F

5