478.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 70 行
TXT
70 行
Rule:--Sid:478--Summary:This event is generated when Broadscan Smurf Scanner generates an ICMP echorequest message.--Impact:ICMP echo requests are used to determine if a host is running at aspecific IP address. A remote attacker can scan a large range of hostsusing ICMP echo requests to determine what hosts are operational on thenetwork.--Detailed Information:The Broadscan Smurf Scanner generates an ICMP echo packet with a specificdatagram signature. --Attack Scenarios:A remote attacker might scan a large range of hosts using ICMP echorequests to determine what hosts are operational on the network.--Ease of Attack:Simple. Packet generation tools can generate this type of ICMP packet--False Positives:None known--False Negatives:Packet generation tools can generate ICMP echo requests withuser-defined payloads. This could allow attackers to replace thissignature with binary values and conceal their operating system.--Corrective Action:To prevent information gathering, use a firewall to block incoming ICMPType 8 Code 0 traffic.--Contributors:Original Rule writer unknownSourcefire Vulnerability Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)--Additional References:--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?