cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1801
Views
0
Helpful
3
Replies

Detection against Vulnerability Assessment

chanccmtech
Level 1
Level 1

Good Day All, 

 

The Firepower appliance is currently capable of detecting against vulnerability assessment by default, am I right on this? I think I recalled on the previous versions that there is an option to enable NMAP scanning in the intrusion policies. 

 

Or am I missing the point here?

Appreciate some explaination :)

1 Accepted Solution

Accepted Solutions

Oh - you're asking about detectng nmap. In that case yes - you can go under Objects > Intrusion Rules and search for nmap.

 

I believe, for example, the following rule is relevant and included by default:

 

Rule Documentation (1:629:8)

This event is generated when the nmap port scanner and reconnaissance
tool is used against a host.

When run with the '-O' option, it attempts to identify the remote
operating system.
Rule alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"DELETED SCAN nmap fingerprint attempt"; flow:stateless; flags:SFPU; reference:arachnids,05; classtype:attempted-recon; sid:629; rev:8; gid:1; )
Impact Can provide useful reconnaissance information to an attacker. Has been
known to cause a denial of service on some older hosts.
Detailed Information nmap attempts to identify the remote operating system by looking for
different services that are common or specific to particular operating
systems. It also sends a variety of abnormal packets that are often
handled differently by different operating systems so that it can
differentiate between them based on the responses.
Affected Systems All
Attack Scenarios nmap is often used before an attempt to gain access to a system.
Ease of Attack Simple
False Positives None known. The signature may be produced by other scanners but is
unlikely to be used for legitimate activity.
False Negatives None known.
Corrective Action Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags set
using a firewall. Block only packets that have all four of the flags
set as they are individually and in other combinations necessary for
normal TCP traffic. If you block them individually or in other
combinations your network will not function correctly.
Contributors Original Rule Writer Unknown (prime suspect is Marty Roesch)
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>

View solution in original post

3 Replies 3

Marvin Rhoads
Hall of Fame
Hall of Fame

It's not really in the Intrusion Policy per se but you can nmap scan as a result of a network discovery with active detection or as a response to a correlation rule.

 

The following links have details on those use cases:

 

https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/introduction_to_network_discovery_and_identity.html#concept_B9C9F7BF250847D6A4FB888CB738EA17

 

 

https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/host_identity_sources.html#ID-2219-00000532

What if it was to detect vulnerabilty scans? Is there anything that I must do to enable them? 

Oh - you're asking about detectng nmap. In that case yes - you can go under Objects > Intrusion Rules and search for nmap.

 

I believe, for example, the following rule is relevant and included by default:

 

Rule Documentation (1:629:8)

This event is generated when the nmap port scanner and reconnaissance
tool is used against a host.

When run with the '-O' option, it attempts to identify the remote
operating system.
Rule alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"DELETED SCAN nmap fingerprint attempt"; flow:stateless; flags:SFPU; reference:arachnids,05; classtype:attempted-recon; sid:629; rev:8; gid:1; )
Impact Can provide useful reconnaissance information to an attacker. Has been
known to cause a denial of service on some older hosts.
Detailed Information nmap attempts to identify the remote operating system by looking for
different services that are common or specific to particular operating
systems. It also sends a variety of abnormal packets that are often
handled differently by different operating systems so that it can
differentiate between them based on the responses.
Affected Systems All
Attack Scenarios nmap is often used before an attempt to gain access to a system.
Ease of Attack Simple
False Positives None known. The signature may be produced by other scanners but is
unlikely to be used for legitimate activity.
False Negatives None known.
Corrective Action Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags set
using a firewall. Block only packets that have all four of the flags
set as they are individually and in other combinations necessary for
normal TCP traffic. If you block them individually or in other
combinations your network will not function correctly.
Contributors Original Rule Writer Unknown (prime suspect is Marty Roesch)
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>
Review Cisco Networking for a $25 gift card