09-28-2017 12:51 AM - edited 02-21-2020 06:23 AM
Good Day All,
The Firepower appliance is currently capable of detecting against vulnerability assessment by default, am I right on this? I think I recalled on the previous versions that there is an option to enable NMAP scanning in the intrusion policies.
Or am I missing the point here?
Appreciate some explaination :)
Solved! Go to Solution.
09-29-2017 05:02 AM - edited 09-29-2017 05:04 AM
Oh - you're asking about detectng nmap. In that case yes - you can go under Objects > Intrusion Rules and search for nmap.
I believe, for example, the following rule is relevant and included by default:
Rule Documentation (1:629:8) |
|
---|---|
This event is generated when the nmap port scanner and reconnaissance
tool is used against a host. When run with the '-O' option, it attempts to identify the remote operating system. |
|
Rule | alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"DELETED SCAN nmap fingerprint attempt"; flow:stateless; flags:SFPU; reference:arachnids,05; classtype:attempted-recon; sid:629; rev:8; gid:1; ) |
Impact | Can provide useful reconnaissance information to an attacker. Has been known to cause a denial of service on some older hosts. |
Detailed Information | nmap attempts to identify the remote operating system by looking for different services that are common or specific to particular operating systems. It also sends a variety of abnormal packets that are often handled differently by different operating systems so that it can differentiate between them based on the responses. |
Affected Systems | All |
Attack Scenarios | nmap is often used before an attempt to gain access to a system. |
Ease of Attack | Simple |
False Positives | None known. The signature may be produced by other scanners but is unlikely to be used for legitimate activity. |
False Negatives | None known. |
Corrective Action | Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags set using a firewall. Block only packets that have all four of the flags set as they are individually and in other combinations necessary for normal TCP traffic. If you block them individually or in other combinations your network will not function correctly. |
Contributors | Original Rule Writer Unknown (prime suspect is Marty Roesch) Sourcefire Research Team Nigel Houghton <nigel.houghton@sourcefire.com> Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu> |
09-28-2017 11:07 PM - edited 09-29-2017 05:05 AM
It's not really in the Intrusion Policy per se but you can nmap scan as a result of a network discovery with active detection or as a response to a correlation rule.
The following links have details on those use cases:
09-29-2017 12:28 AM
What if it was to detect vulnerabilty scans? Is there anything that I must do to enable them?
09-29-2017 05:02 AM - edited 09-29-2017 05:04 AM
Oh - you're asking about detectng nmap. In that case yes - you can go under Objects > Intrusion Rules and search for nmap.
I believe, for example, the following rule is relevant and included by default:
Rule Documentation (1:629:8) |
|
---|---|
This event is generated when the nmap port scanner and reconnaissance
tool is used against a host. When run with the '-O' option, it attempts to identify the remote operating system. |
|
Rule | alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"DELETED SCAN nmap fingerprint attempt"; flow:stateless; flags:SFPU; reference:arachnids,05; classtype:attempted-recon; sid:629; rev:8; gid:1; ) |
Impact | Can provide useful reconnaissance information to an attacker. Has been known to cause a denial of service on some older hosts. |
Detailed Information | nmap attempts to identify the remote operating system by looking for different services that are common or specific to particular operating systems. It also sends a variety of abnormal packets that are often handled differently by different operating systems so that it can differentiate between them based on the responses. |
Affected Systems | All |
Attack Scenarios | nmap is often used before an attempt to gain access to a system. |
Ease of Attack | Simple |
False Positives | None known. The signature may be produced by other scanners but is unlikely to be used for legitimate activity. |
False Negatives | None known. |
Corrective Action | Block any TCP packets that have the SYN, FIN, PUSH and URGENT flags set using a firewall. Block only packets that have all four of the flags set as they are individually and in other combinations necessary for normal TCP traffic. If you block them individually or in other combinations your network will not function correctly. |
Contributors | Original Rule Writer Unknown (prime suspect is Marty Roesch) Sourcefire Research Team Nigel Houghton <nigel.houghton@sourcefire.com> Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu> |
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide