Rule Category

PROTOCOL-ICMP -- Snort alerted on Internet Control Message Protocol (ICMP) traffic, which allows hosts to send error messages about interruptions in traffic. Administrators can use ICMP to perform diagnostics and troubleshooting, but the protocol can also be used by attackers to gain information on a network. This protocol is vulnerable to several attacks, and many administrators block it altogether, or block selective messages.

Alert Message

PROTOCOL-ICMP PING Unix

Rule Explanation

ping is a standard networking utility that determines if a target host is up. This rule indicates that the ping originated from a host running Unix. Impact: Information Disclosure. Ping can be used as a reconnaissance tool. Details: ping sends an ICMP Echo Request packet to an IP address. If a host is up at that address it will reply with an ICMP Echo Reply. The reply includes the data portion of the echo packet. The data included in the Echo Request varies across different operating system implementations. Ease of Attack: Simple.

What To Look For

ping is a standard networking utility that determines if a target host is up. This rule indicates that the ping originated from a host running Unix.

Known Usage

No public information

False Positives

Known false positives, with the described conditions

This program is also used legitimately by users and/or network administrators to troubleshoot problems. It is possible to emulate this ping signature using another ping utility.

Contributors

Original Rule Writer Unknown Cisco Talos Nigel Houghton Snort documentation contributed by Steven Alexander<alexander.s@mccd.edu>

Rule Groups

No rule groups

CVE

None

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Discovery

Technique: Remote System Discovery

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org