PROTOCOL-ICMP -- Snort alerted on Internet Control Message Protocol (ICMP) traffic, which allows hosts to send error messages about interruptions in traffic. Administrators can use ICMP to perform diagnostics and troubleshooting, but the protocol can also be used by attackers to gain information on a network. This protocol is vulnerable to several attacks, and many administrators block it altogether, or block selective messages.
PROTOCOL-ICMP PING Unix
ping is a standard networking utility that determines if a target host is up. This rule indicates that the ping originated from a host running Unix. Impact: Information Disclosure. Ping can be used as a reconnaissance tool. Details: ping sends an ICMP Echo Request packet to an IP address. If a host is up at that address it will reply with an ICMP Echo Reply. The reply includes the data portion of the echo packet. The data included in the Echo Request varies across different operating system implementations. Ease of Attack: Simple.
ping is a standard networking utility that determines if a target host is up. This rule indicates that the ping originated from a host running Unix.
No public information
Known false positives, with the described conditions
This program is also used legitimately by users and/or network administrators to troubleshoot problems. It is possible to emulate this ping signature using another ping utility.
Original Rule Writer Unknown Cisco Talos Nigel Houghton Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>
No rule groups
None
No information provided
None
Tactic: Discovery
Technique: Remote System Discovery
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org