1000
|
400000
|
IP options-Bad Option List
|
Informational
|
Triggers on receipt of an IP datagram where the list of IP options in the IP datagram header is incomplete or malformed. The
IP options list contains one or more options that perform various network management or debugging tasks.
|
1001
|
400001
|
IP options-Record Packet Route
|
Informational
|
Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 7 (Record Packet Route).
|
1002
|
400002
|
IP options-Timestamp
|
Informational
|
Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 4 (Timestamp).
|
1003
|
400003
|
IP options-Security
|
Informational
|
Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 2 (Security options).
|
1004
|
400004
|
IP options-Loose Source Route
|
Informational
|
Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 3 (Loose Source Route).
|
1005
|
400005
|
IP options-SATNET ID
|
Informational
|
Triggers on receipt of an IP datagram where the IP option list for the datagram includes option 8 (SATNET stream identifier).
|
1006
|
400006
|
IP options-Strict Source Route
|
Informational
|
Triggers on receipt of an IP datagram in which the IP option list for the datagram includes option 9(Strict Source Routing).
|
1100
|
400007
|
IP Fragment Attack
|
Attack
|
Triggers when any IP datagram is received with an offset value less than 5 but greater than 0 indicated in the offset field.
|
1102
|
400008
|
IP Impossible Packet
|
Attack
|
Triggers when an IP packet arrives with source equal to destination address. This signature will catch the so-called Land
Attack.
|
1103
|
400009
|
IP Overlapping Fragments (Teardrop)
|
Attack
|
Triggers when two fragments contained within the same IP datagram have offsets that indicate that they share positioning within
the datagram. This could mean that fragment A is being completely overwritten by fragment B, or that fragment A is partially
being overwritten by fragment B. Some operating systems do not properly handle fragments that overlap in this manner and may
throw exceptions or behave in other undesirable ways upon receipt of overlapping fragments, which is how the Teardrop attack
works to create a DoS.
|
2000
|
400010
|
ICMP Echo Reply
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 0 (Echo Reply).
|
2001
|
400011
|
ICMP Host Unreachable
|
Informational
|
Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 3 (Host Unreachable).
|
2002
|
400012
|
ICMP Source Quench
|
Informational
|
Triggers when an IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 4 (Source Quench).
|
2003
|
400013
|
ICMP Redirect
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 5 (Redirect).
|
2004
|
400014
|
ICMP Echo Request
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 8 (Echo Request).
|
2005
|
400015
|
ICMP Time Exceeded for a Datagram
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1(ICMP) and the type field in the
ICMP header set to 11(Time Exceeded for a Datagram).
|
2006
|
400016
|
ICMP Parameter Problem on Datagram
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 12 (Parameter Problem on Datagram).
|
2007
|
400017
|
ICMP Timestamp Request
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 13 (Timestamp Request).
|
2008
|
400018
|
ICMP Timestamp Reply
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 14 (Timestamp Reply).
|
2009
|
400019
|
ICMP Information Request
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 15 (Information Request).
|
2010
|
400020
|
ICMP Information Reply
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 16 (ICMP Information Reply).
|
2011
|
400021
|
ICMP Address Mask Request
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 17 (Address Mask Request).
|
2012
|
400022
|
ICMP Address Mask Reply
|
Informational
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and the type field in the
ICMP header set to 18 (Address Mask Reply).
|
2150
|
400023
|
Fragmented ICMP Traffic
|
Attack
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1 (ICMP) and either the more fragments
flag is set to 1 (ICMP) or there is an offset indicated in the offset field.
|
2151
|
400024
|
Large ICMP Traffic
|
Attack
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1(ICMP) and the IP length > 1024.
|
2154
|
400025
|
Ping of Death Attack
|
Attack
|
Triggers when a IP datagram is received with the protocol field of the IP header set to 1(ICMP), the Last Fragment bit is
set, and (IP offset * 8) + (IP data length) > 65535 that is to say, the IP offset (which represents the starting position
of this fragment in the original packet, and which is in 8 byte units) plus the rest of the packet is greater than the maximum
size for an IP packet.
|
3040
|
400026
|
TCP NULL flags
|
Attack
|
Triggers when a single TCP packet with none of the SYN, FIN, ACK, or RST flags set has been sent to a specific host.
|
3041
|
400027
|
TCP SYN+FIN flags |
Attack
|
Triggers when a single TCP packet with the SYN and FIN flags are set and is sent to a specific host.
|
3042
|
400028
|
TCP FIN only flags
|
Attack
|
Triggers when a single orphaned TCP FIN packet is sent to a privileged port (having port number less than 1024) on a specific
host.
|
3153
|
400029
|
FTP Improper Address Specified
|
Informational
|
Triggers if a port command is issued with an address that is not the same as the requesting host.
|
3154
|
400030
|
FTP Improper Port Specified
|
Informational
|
Triggers if a port command is issued with a data port specified that is <1024 or >65535.
|
4050
|
400031
|
UDP Bomb attack
|
Attack
|
Triggers when the UDP length specified is less than the IP length specified. This malformed packet type is associated with
a denial of service attempt.
|
4051
|
400032
|
UDP Snork attack
|
Attack
|
Triggers when a UDP packet with a source port of either 135, 7, or 19 and a destination port of 135 is detected.
|
4052
|
400033
|
UDP Chargen DoS attack
|
Attack
|
This signature triggers when a UDP packet is detected with a source port of 7 and a destination port of 19.
|
6050
|
400034
|
DNS HINFO Request
|
Informational
|
Triggers on an attempt to access HINFO records from a DNS server.
|
6051
|
400035
|
DNS Zone Transfer
|
Informational
|
Triggers on normal DNS zone transfers, in which the source port is 53.
|
6052
|
400036
|
DNS Zone Transfer from High Port
|
Informational
|
Triggers on an illegitimate DNS zone transfer, in which the source port is not equal to 53.
|
6053
|
400037
|
DNS Request for All Records
|
Informational
|
Triggers on a DNS request for all records.
|
6100
|
400038
|
RPC Port Registration
|
Informational
|
Triggers when attempts are made to register new RPC services on a target host.
|
6101
|
400039
|
RPC Port Unregistration
|
Informational
|
Triggers when attempts are made to unregister existing RPC services on a target host.
|
6102
|
400040
|
RPC Dump
|
Informational
|
Triggers when an RPC dump request is issued to a target host.
|
6103
|
400041
|
Proxied RPC Request
|
Attack
|
Triggers when a proxied RPC request is sent to the portmapper of a target host.
|
6150
|
400042
|
ypserv (YP server daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the YP server daemon (ypserv) port.
|
6151
|
400043
|
ypbind (YP bind daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the YP bind daemon (ypbind) port.
|
6152
|
400044
|
yppasswdd (YP password daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the YP password daemon (yppasswdd) port.
|
6153
|
400045
|
ypupdated (YP update daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the YP update daemon (ypupdated) port.
|
6154
|
400046
|
ypxfrd (YP transfer daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the YP transfer daemon (ypxfrd) port.
|
6155
|
400047
|
mountd (mount daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the mount daemon (mountd) port.
|
6175
|
400048
|
rexd (remote execution daemon) Portmap Request
|
Informational
|
Triggers when a request is made to the portmapper for the remote execution daemon (rexd) port.
|
6180
|
400049
|
rexd (remote execution daemon) Attempt
|
Informational
|
Triggers when a call to the rexd program is made. The remote execution daemon is the server responsible for remote program
execution. This may be indicative of an attempt to gain unauthorized access to system resources.
|
6190
|
400050
|
statd Buffer Overflow
|
Attack
|
Triggers when a large statd request is sent. This could be an attempt to overflow a buffer and gain access to system resources.
|