📄 366.txt
字号:
Rule:--Sid:366--Summary:ping is a standard networking utility that determines if a target hostis up. This rule indicates that the ping originated from a host runningUnix.--Impact:Information Disclosure. Ping can be used as a reconnaissance tool.--Detailed Information:ping sends an ICMP Echo Request packet to an IP address. If a host isup at that address it will reply with an ICMP Echo Reply. The replyincludes the data portion of the echo packet. The data included in theEcho Request varies across different operating system implementations.--Affected Systems:All--Attack Scenarios:An attacker will often ping a machine to make sure it is up beforeattacking.--Ease of Attack:Simple.--False Positives:This program is also used legitimately by users and/or networkadministrators to troubleshoot problems. It is possible to emulate thisping signature using another ping utility.--False Negatives:None known.--Corrective Action:ICMP packets can be blocked with a packet filtering firewall.--Contributors:Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>--Additional References:--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -