478.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 70 行

TXT
70
字号
Rule:--Sid:478--Summary:This event is generated when Broadscan Smurf Scanner generates an ICMP echorequest message.--Impact:ICMP echo requests are used to determine if a host is running at aspecific IP address.  A remote attacker can scan a large range of hostsusing ICMP echo requests to determine what hosts are operational on thenetwork.--Detailed Information:The Broadscan Smurf Scanner generates an ICMP echo packet with a specificdatagram signature.  --Attack Scenarios:A remote attacker might scan a large range of hosts using ICMP echorequests to determine what hosts are operational on the network.--Ease of Attack:Simple.  Packet generation tools can generate this type of ICMP packet--False Positives:None known--False Negatives:Packet generation tools can generate ICMP echo requests withuser-defined payloads.  This could allow attackers to replace thissignature with binary values and conceal their operating system.--Corrective Action:To prevent information gathering, use a firewall to block incoming ICMPType 8 Code 0 traffic.--Contributors:Original Rule writer unknownSourcefire Vulnerability Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)--Additional References:--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?