PROTOCOL-ICMP -- Snort alerted on Internet Control Message Protocol (ICMP) traffic, which allows hosts to send error messages about interruptions in traffic. Administrators can use ICMP to perform diagnostics and troubleshooting, but the protocol can also be used by attackers to gain information on a network. This protocol is vulnerable to several attacks, and many administrators block it altogether, or block selective messages.
PROTOCOL-ICMP Echo Reply
This event is generated when a network host generates an ICMP Echo Reply in response to an ICMP Echo Request message. Impact: Information-gathering. An ICMP Echo Reply message is sent in response to an ICMP REcho Request message. If the ICMP Echo Reply message reaches the requesting host it indicates that the replying host is alive. Details: ICMP Type 0 Code 0 is the RFC defined messaging type for ICMP Echo Reply datagrams. This type of message is used to determine if a host is active on the network. Ease of Attack: Numerous tools and scripts can generate this type of ICMP datagram.
This event is generated when a network host generates an ICMP Echo Reply in response to an ICMP Echo Request message.
No public information
No known false positives
Original rule writer unknown Cisco Talos Matthew Watchinski
No rule groups
None
No information provided
None
Tactic: Discovery
Technique: Remote System Discovery
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org