File: 1638.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (66 lines) | stat: -rw-r--r-- 1,307 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
Rule:

--
Sid:
1638

--
Summary:
This event is generated when a scan for the version of an ssh daemon is
detected.

--
Impact:
Information gathering.

--
Detailed Information:
This event indicates that an attempt has been made to scan a host. In
particular an attempt has been made to scan for the version of the ssh
daemon on the target host.

This may be the prelude to an attack. Scanners are used to ascertain
which ports a host may be listening on, whether or not the ports are
filtered by a firewall and if the host is vulnerable to a particular
exploit.

--
Affected Systems:
	Any host using the ssh daemon.

--
Attack Scenarios:
An attacker can determine if a vulnerable version of ssh is being used
on a host, then proceed to exploit that vulnerablity.

--
Ease of Attack:
Simple.

--
False Positives:
A scanner may be used in a security audit.

--
False Negatives:
If the scanning tool does not send an identification string this rule
will not generate an event.

--
Corrective Action:
Determine whether or not the scan was legitimate then look for other
events concerning the attacking IP address.

Check the host for signs of compromise.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:


--