I need to write a rule that captures the SYN-scanning.
I tried this: alert tcp any any -> any any (flags:S,12; msg:"SYN"; sid: 1231213;)
then try to scan: nmap -sS myIP
but this does not output "SYN"
How to write a correct rule? Thanks.
相关问题
- IPAddress.[Try]Parse parses 192.168 to 192.0.0.168
- What does the LinkedAuthorizationFailed mean in Po
- What would prevent code running in a Docker contai
- How to run tcp and udp on a single port at same ti
- Docker-Compose: Can't Connect to Mongo
相关文章
- RMI Threads prevent JVM from exiting after main()
- fsc.exe is very slow because it tries to access cr
- How many times will TCP retransmit
- Writing an OS X kernel extension to implement Linu
- Virtual Box limit Bandwith on network [closed]
- Is ICMP a transport layer protocol?
- How to add negative filter in network tab of Chrom
- Chrome failing to connect to websocket server (Opc
Try to change
flags:S,12
toflags:S
as the Snort manual states:So
12
will check if the two reserved bits are set which is probably not what you want. Also as I understand the documentationflags:S
will match packets with only SYN set which should be correct in your case I guess. If you want to match some flags regardless of other flags you can use*
.