<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detection against Vulnerability Assessment in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191501#M1041587</link>
    <description>&lt;P&gt;What if it was to detect vulnerabilty scans? Is there anything that I must do to enable them?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Sep 2017 07:28:15 GMT</pubDate>
    <dc:creator>chanccmtech</dc:creator>
    <dc:date>2017-09-29T07:28:15Z</dc:date>
    <item>
      <title>Detection against Vulnerability Assessment</title>
      <link>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3190841#M1041585</link>
      <description>&lt;P&gt;Good Day All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Firepower appliance is currently capable of detecting against vulnerability assessment by default, am I right on this? I think I recalled on the previous versions that there is an option to enable NMAP scanning in the intrusion policies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or am I missing the point here?&lt;/P&gt;&lt;P&gt;Appreciate some explaination &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3190841#M1041585</guid>
      <dc:creator>chanccmtech</dc:creator>
      <dc:date>2020-02-21T14:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Detection against Vulnerability Assessment</title>
      <link>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191490#M1041586</link>
      <description>&lt;P&gt;It's not really in the Intrusion Policy per se but you can nmap scan as a result of a network discovery with active detection or as a response to a correlation rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following links have details on those use cases:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/introduction_to_network_discovery_and_identity.html#concept_B9C9F7BF250847D6A4FB888CB738EA17" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/introduction_to_network_discovery_and_identity.html#concept_B9C9F7BF250847D6A4FB888CB738EA17&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/host_identity_sources.html#ID-2219-00000532" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/host_identity_sources.html#ID-2219-00000532&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2017 12:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191490#M1041586</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-29T12:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: Detection against Vulnerability Assessment</title>
      <link>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191501#M1041587</link>
      <description>&lt;P&gt;What if it was to detect vulnerabilty scans? Is there anything that I must do to enable them?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2017 07:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191501#M1041587</guid>
      <dc:creator>chanccmtech</dc:creator>
      <dc:date>2017-09-29T07:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Detection against Vulnerability Assessment</title>
      <link>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191605#M1041588</link>
      <description>&lt;P&gt;Oh - you're asking about detectng nmap. In that case yes - you can go under Objects &amp;gt; Intrusion Rules and search for nmap.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe, for example, the following rule is relevant and included by default:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR class="first"&gt;
&lt;TH colspan="2"&gt;
&lt;H2&gt;Rule Documentation (1:629:8)&lt;/H2&gt;
&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="2"&gt;
&lt;DIV class="description"&gt;This event is generated when the nmap port scanner and reconnaissance &lt;BR /&gt;tool is used against a host.&lt;BR /&gt;&lt;BR /&gt;When run with the '-O' option, it attempts to identify the remote &lt;BR /&gt;operating system.&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Rule&lt;/TH&gt;
&lt;TD&gt;alert tcp $EXTERNAL_NET any -&amp;gt; $HOME_NET any (msg:"DELETED SCAN nmap fingerprint attempt"; flow:stateless; flags:SFPU; reference:arachnids,05; classtype:attempted-recon; sid:629; rev:8; gid:1; )&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Impact&lt;/TH&gt;
&lt;TD&gt;Can provide useful reconnaissance information to an attacker. Has been&lt;BR /&gt;known to cause a denial of service on some older hosts.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Detailed Information&lt;/TH&gt;
&lt;TD&gt;nmap attempts to identify the remote operating system by looking for&lt;BR /&gt;different services that are common or specific to particular operating&lt;BR /&gt;systems. It also sends a variety of abnormal packets that are often&lt;BR /&gt;handled differently by different operating systems so that it can&lt;BR /&gt;differentiate between them based on the responses.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Affected Systems&lt;/TH&gt;
&lt;TD&gt;All&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Attack Scenarios&lt;/TH&gt;
&lt;TD&gt;nmap is often used before an attempt to gain access to a system.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Ease of Attack&lt;/TH&gt;
&lt;TD&gt;Simple&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;False Positives&lt;/TH&gt;
&lt;TD&gt;None known. The signature may be produced by other scanners but is&lt;BR /&gt;unlikely to be used for legitimate activity.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;False Negatives&lt;/TH&gt;
&lt;TD&gt;None known.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Corrective Action&lt;/TH&gt;
&lt;TD&gt;Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags set&lt;BR /&gt;using a firewall. Block only packets that have all four of the flags&lt;BR /&gt;set as they are individually and in other combinations necessary for&lt;BR /&gt;normal TCP traffic. If you block them individually or in other&lt;BR /&gt;combinations your network will not function correctly.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TH&gt;Contributors&lt;/TH&gt;
&lt;TD&gt;Original Rule Writer Unknown (prime suspect is Marty Roesch)&lt;BR /&gt;Sourcefire Research Team&lt;BR /&gt;Nigel Houghton &amp;lt;nigel.houghton@sourcefire.com&amp;gt;&lt;BR /&gt;Snort documentation contributed by Steven Alexander&amp;lt;alexander.s@mccd.edu&amp;gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Fri, 29 Sep 2017 12:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/detection-against-vulnerability-assessment/m-p/3191605#M1041588</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-29T12:04:13Z</dc:date>
    </item>
  </channel>
</rss>

