?? 623.txt
字號:
Rule:--Sid:623--Summary:A tcp packet with none of it's control bits set was detected.--Impact:Information regarding firewall rulesets, open/closed ports, ACLs, andpossibly even OS type is possible. This technique can also be used tobypass certain firewalls or traffic filtering/shaping devices.--Detailed Information:A tcp packet with none of it's control bits (URG, ACK, PSH, RST, SYN,FIN) was detected. Additionally, both the sequence number andacknowledgement number were set to 0. An open port will generally notrespond at all, whereas a closed port will generally respond with anACK RST. The particular response varies between operating systems,and is also governed by any filtering that may be done between the twohosts.--Affected Systems: --Attack Scenarios:As part of information gathering leading up to another (more directed)attack, an attacker may attempt to figure out what ports areopen/closed on a remote machine.--Ease of Attack:Intermediate. To initiate an attack of this type, an attacker eitherneeds a tool that can send tcp packets with no control bits set orthe ability to craft their own packets. The former is easy, the laterrequires a more advanced skillset.--False Positives:None Known--False Negatives:None Known--Corrective Action:Determine if this particular port would have responded as being openor closed. If open, watch for more attacks on this particular serviceor from the remote machine that sent the packet. If closed, simplywatch for more traffic from this host.--Contributors:Original rule writer unknownOriginal document author unkownSourcefire Vulnerability Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Jon Hart <warchild@spoofed.org>-- Additional References:--
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -