Rule Category

PROTOCOL-DNS -- Snort alerted on a Domain Name Server (DNS) protocol issue. These packets travel over UDP on port 53 to serve DNS queries--user website requests through a browser. Several vulnerability use-cases exist (ie, additional data could be sent with a request, which would contact a DNS server pre-prepared to send information back and forth).

Alert Message

PROTOCOL-DNS dns response for rfc1918 192.168/16 address detected

Rule Explanation

This event is generated when an RFC 1918 non-routable address is seen in a DNS response to an external query. Impact: Intelligence gathering activity Details: RFC 1918 address space is non-routable address space meant to be used on internal networks. These addresses are non-routable across the Internet. An address of this type should never be seen in a DNS response to a query originating from sources external to the protected network. Ease of Attack: Simple

What To Look For

This event is generated when an RFC 1918 non-routable address is seen in a DNS response to an external query.

Known Usage

No public information

False Positives

Known false positives, with the described conditions

If the EXTERNAL_NET variable is not set to be outside the protected internal network space or if the sensor is being used on an internal segment inside RFC 1918 address space this rule will generate events. Otherwise there are no known false positive situations.

Contributors

Cisco Talos

Rule Groups

No rule groups

CVE

None

Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.

None

MITRE ATT&CK Framework

Tactic: Discovery

Technique: Drive-by Compromise

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org