Enum usiem::events::intrusion::IntrusionCategory [−][src]
#[non_exhaustive]
pub enum IntrusionCategory {
Show 30 variants
XSS,
SQL_INJECTION,
PATH_TRANSVERSAL,
WEB_ATTACK,
DOS,
SURVEILLANCE,
TROJAN,
VIRUS,
SPYWARE,
RAT_TOOL,
RANSOMWARE,
HACKTOOL,
PROXY_AVOIDANCE,
REMOTE_EXPLOIT,
LOCAL_EXPLOIT,
BOTNET,
SPAM,
PHISHING,
CEO_FRAUD,
SCAM,
DATA_THEFT,
BRUTE_FORCE,
MISCONFIGURATION,
AD_ATTACK,
UNKNOWN,
INFORMATION_LEAKAGE,
ANOMALY,
SESSION_FIXATION,
PROTOCOL_ATTACK,
REPUTATION,
}
Variants (Non-exhaustive)
This enum is marked as non-exhaustive
Cross site scripting
SQL Injection
Path Transversal attack
Common web attacks
Denial of service
Scan or Surveillance
Trojan horse
Simple virus
Spyware
Remote administration tools
Ransomware attacks
Hacktools like mimikatz
TOR or Web proxies
Remote execution exploit
Local execution exploit
Botnet related
Spam
Phising
Email scam
Email scam
Exfiltration of information
Brute force: Password/users guessing
Clear text passwords…
Active Directory attack: kerberoasting, DC Sync, Golden Ticket, Pass the Hash, Pass the ticket…
Information Leakage involves the exposure of information that would facilitate attacks on the application or other infrastructure, such as insight into the application design, deployment, or organizational details.
Anormal behaviour
Session Fixation is an attack technique that forces a user’s session ID to an explicit value.
Protocol violations: HTTP Response Splitting, HTTP Request Smuggling, HTTP Header Injection
IP, COUNTRY, DOMAIN in a suspicious or block list
Trait Implementations
Auto Trait Implementations
impl RefUnwindSafe for IntrusionCategory
impl Send for IntrusionCategory
impl Sync for IntrusionCategory
impl Unpin for IntrusionCategory
impl UnwindSafe for IntrusionCategory
Blanket Implementations
Mutably borrows from an owned value. Read more