474.txt

来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 66 行

TXT
66
字号
Rule:--Sid:474--Summary:This event is generated when an ICMP Echo Request from the Windows basedscanner SuperScan is detected.--Impact:Information gathering.--Detailed Information:SuperScan is a freely available Windows based scanner from Foundstone. The scanners default behavior is to send an ICMP Echo Request before starting the scan. This ICMP packet has a special payload of eight (8) bytes, consisting of the number zero (0).This scanner is fairly popular among Windows users.--Affected Systems:	All --Attack Scenarios:SuperScan may be used as an information gathering tool to detect active hostson a network by sending icmp echo requests. --Ease of Attack:Simple.  SuperScan is widely available.--False Positives:Tools other than SuperScan may generate echo requests with the same content.--False Negatives:None Known--Corrective Action:--Contributors:Original rule writer unknownSnort documentation contributed by Johan Augustsson<johan.augustsson@adm.gu.se> and Josh GraySourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>-- Additional References:Foundstonehttp://www.foundstone.com/McAfee:http://vil.nai.com/vil/content/v_103727.htm--

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?