📄 629.txt
字号:
Rule:--Sid:629--Summary:This event is generated when the nmap port scanner and reconnaissance tool is used against a host.When run with the '-O' option, it attempts to identify the remote operating system.--Impact:Can provide useful reconnaissance information to an attacker. Has beenknown to cause a denial of service on some older hosts.--Detailed Information:nmap attempts to identify the remote operating system by looking fordifferent services that are common or specific to particular operatingsystems. It also sends a variety of abnormal packets that are oftenhandled differently by different operating systems so that it candifferentiate between them based on the responses.--Affected Systems:All--Attack Scenarios:nmap is often used before an attempt to gain access to a system.--Ease of Attack:Simple--False Positives:None known. The signature may be produced by other scanners but isunlikely to be used for legitimate activity.--False Negatives:None known.--Corrective Action:Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags setusing a firewall. Block only packets that have all four of the flagsset as they are individually and in other combinations necessary fornormal TCP traffic. If you block them individually or in othercombinations your network will not function correctly.--Contributors:Original Rule Writer Unknown (prime suspect is Marty Roesch)Sourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>--Additional References:Arachnids:http://www.whitehats.com/info/IDS05Nmap scanner:http://www.insecure.org--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -