629.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 73 行

TXT
73
字号
Rule:--Sid:629--Summary:This event is generated when the nmap port scanner and reconnaissance tool is used against a host.When run with the '-O' option, it attempts to identify the remote  operating system.--Impact:Can provide useful reconnaissance information to an attacker.  Has beenknown to cause a denial of service on some older  hosts.--Detailed Information:nmap attempts to identify the remote operating system by looking fordifferent services that are common or specific to  particular operatingsystems.  It also sends a variety of abnormal packets that are oftenhandled differently by different  operating systems so that it candifferentiate between them based on the responses.--Affected Systems:All--Attack Scenarios:nmap is often used before an attempt to gain access to a system.--Ease of Attack:Simple--False Positives:None known.  The signature may be produced by other scanners but isunlikely to be used for legitimate activity.--False Negatives:None known.--Corrective Action:Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags setusing a firewall.  Block only packets that have all four of the flagsset as they are individually and in other combinations necessary fornormal TCP traffic.  If you block them  individually or in othercombinations your network will not function correctly.--Contributors:Original Rule Writer Unknown (prime suspect is Marty Roesch)Sourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>--Additional References:Arachnids:http://www.whitehats.com/info/IDS05Nmap scanner:http://www.insecure.org--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?