📄 451.txt
字号:
Rule:--Sid:408--Summary:This event is generated when a network host generates an ICMP Timestamp Reply in response to an ICMP Timestamp Request message.--Impact:Information-gathering. An ICMP Timestamp Reply message is sent in response to an ICMP RTimestamp Request message. If the ICMP Timestamp Reply message reaches the requesting host it indicates that the replying host is alive.--Detailed Information:ICMP Type 0 Code 0 is the RFC defined messaging type for ICMP Timestamp Reply datagrams. This type of message is used to determine if a host is active on the network.If ICMP type 8 (echo) traffic is filtered at a firewall, an attacker may try to use type 14 (timestamp) as an alternative.--Attack Scenarios:A remote attacker may use ICMP Timestamp Request datagrams to determine active hosts on the network in prelude of further attacks.--Ease of Attack:Numerous tools and scripts can generate this type of ICMP datagram.--False Positives:None known--False Negatives:None known--Corrective Action:Use ingress filtering to prevent ICMP Type 0 Code 8 messages from entering the network.--Contributors:Original rule writer unknownSourcefire Research TeamMatthew Watchinski (matt.watchinski@sourcefire.com)Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References:None--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -