Hello,
I’m trying to detect every nmap scan with suricata, at this moment I can detect nmap then is used with options -A or -T4.
I don’t see any log updating when nmap is used with options nmap -sS or nmap -p-
For example I have these rules:
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:“ET SCAN NMAP -sS window 4096”; fragbits:!D; dsize:0; flags:S,12; ack:0; window:4096; threshold: type both, track by_dst, count 1, seconds 60; reference:url,doc.emergingthreats.net/2009584; classtype:attempted-recon; sid:2009584; rev:2; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Hello,
I’ve recently started to use suricata, and while doing some tests I discover the same issue mentioned above. I am not an expert, but I would be happy to provide details if this could help.
Yes it does, as for Luke126 I tried with the -A or -T4 and it works but not with -sS or -p. Sometimes also the -A doesn’t work. If this could help, I try the scan from a Virtual Machine running Kali Linux on a computer in the same lan of the RaspberryPi.
nmap -sS is a syn scan. So it only uses the SYN part of the communication and does not require an ACK. ACK is something from your server side and therefore would be detected and leed to a trigger.
-sS is a safe way for information gathering. -p probably uses a SYN scan also and does not require an ACK and therefore also goes undetected.
Open for better suggestions…