EmergingThreats> Main Web>2000545 (revision 1)EditAttach

alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits:!M; dsize:0; flags:S,12; ack:0; window:2048; classtype:attempted-recon; reference:url,doc.emergingthreats.net/2000545; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_NMAP; sid:2000545; rev:6;)

Added 2009-07-14 13:39:11 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits:!M; dsize:0; flags:S,12; ack:0; window:2048; classtype:attempted-recon; reference:url,doc.emergingthreats.net/2000545; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_NMAP; sid:2000545; rev:6;)

Added 2009-07-14 13:39:11 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; classtype: attempted-recon; reference:url,doc.emergingthreats.net/2000545; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_NMAP; sid: 2000545; rev:6;)

Added 2009-02-12 18:21:19 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; classtype: attempted-recon; reference:url,doc.emergingthreats.net/2000545; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_NMAP; sid: 2000545; rev:6;)

Added 2009-02-12 18:21:19 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; classtype: attempted-recon; sid: 2000545; rev:5;)

Added 2008-11-11 21:00:22 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; classtype: attempted-recon; sid: 2000545; rev:5;)

Added 2008-11-11 21:00:22 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; reference:arachnids,162; classtype: attempted-recon; sid: 2000545; rev:4;)

Added 2008-01-29 10:56:40 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; reference:arachnids,162; classtype: attempted-recon; sid: 2000545; rev:4;)

Added 2008-01-29 10:56:40 UTC


alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg: "BLEEDING-EDGE SCAN NMAP -f -sS"; fragbits: M; dsize: 0; flags: S,12; ack: 0; window: 2048; reference:arachnids,162; classtype: attempted-recon; sid: 2000545; rev:3; )



Edit | Attach | Print version | History: r2 < r1 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r1 - 2009-12-29 - MattJonkman
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats