[Snort-sigs] SID 373 (my contribution #8)

Steven Alexander alexander.s at ...1565...
Mon Jun 9 09:42:17 EDT 2003


# This is a template for submitting snort signature descriptions to
# the snort.org website
#
# Ensure that your descriptions are your own
# and not the work of others.  References in the rules themselves
# should be used for linking to other's work. 
#
# If you are unsure of some part of a rule, use that as a commentary
# and someone else perhaps will be able to fix it.
# 
# $Id$
#
# 

Rule:  
alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"ICMP PING
Flowpoint2200 or Network Management Software"; itype:8;
content:"|0102030405060708090a0b0c0d0e0f10|"; depth:32;
reference:arachnids,156; sid:373; classtype:misc-activity; rev:4;)  
--
Sid:

373

--
Summary:

ping is a standard networking utility that determines if a target host
is up. This rule indicates that the ping originated from a FlowPoint
2200 DSL router.

--
Impact:

Can be used as a reconnaissance tool.

--
Detailed Information:

ping sends an ICMP Echo Request packet to an IP address.  If a host is
up at that address it will reply with an ICMP Echo Reply.  The reply
includes the data portion of the echo packet.  The data included in the
Echo Request varies across different implementations.

--
Affected Systems:

All
--
Attack Scenarios:

An attacker will often ping a machine to make sure it is up before
attacking.  

--
Ease of Attack:
Very Simple

--
False Positives:
This program is also used legitimately by users and/or network
administrators to troubleshoot problems.  It is possible to emulate this
ping signature using another ping utility.

--
False Negatives:

None known.
--
Corrective Action:

ICMP packets can be blocked with a firewall.

--
Contributors:
Documentation - Steven Alexander<alexander.s at ...1565...>
-- 
Additional References:

http://www.whitehats.com/info/IDS156




More information about the Snort-sigs mailing list