📄 624.txt
字号:
Rule:--Sid:624--Summary:A tcp packet with it's SYN and FIN flags set was detected.--Impact:Information regarding firewall rulesets, open/closed ports, ACLs, andpossibly even OS type is possible. This technique can also be used tobypass certain firewalls or traffic filtering/shaping devices.--Detailed Information:A tcp packet with it's SYN and FIN flags set was detected. Moststacks will respond with an ACK SYN indicating that the port was open,whereas a closed port will illicit an ACK RST. --Affected Systems: --Attack Scenarios:As part of information gathering leading up to another (more directed)attack, an attacker may attempt to figure out what ports areopen/closed on a remote machine.--Ease of Attack:Intermediate. To initiate an attack of this type, an attacker eitherneeds a tool that can send packets with the SYN and FIN flags set orthe ability to craft their own packets. The former is easy, the laterrequires a more advanced skillset.--False Positives:None Known--False Negatives:None Known--Corrective Action:Determine if this particular port would have responded as being openor closed. If open, watch for more attacks on this particular serviceor from the remote machine that sent the packet. If closed, simplywatch for more traffic from this host.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org>-- Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -