[Oisf-users] How suricata detects portscans??

carlopmart carlopmart at gmail.com
Tue Apr 12 08:57:38 UTC 2011


Hi all,

  How suricata detects portscans?? For example, I have had a simple test 
doing:

[carlos at laptop sguil]$ nmap srvdns

Starting Nmap 5.21 ( http://nmap.org ) at 2011-04-12 10:53 CEST
Nmap scan report for srvdns (172.25.50.10)
Host is up (0.0011s latency).
Not shown: 998 closed ports
PORT   STATE SERVICE
22/tcp open  ssh
53/tcp open  domain

Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds

  Alerts detected by suricata:

  04/12-10:53:13.589141  [**] [1:2010937:2] ET POLICY Suspicious inbound 
to mySQL port 3306  [**] [Classification: Potentially Bad Traffic] 
[Priority: 2] {TCP} 172.25.50.30:57780 -> 172.25.50.10:3306
04/12-10:53:13.590083  [**] [1:1418:11] GPL SNMP request tcp  [**] 
[Classification: Attempted Information Leak] [Priority: 2] {TCP} 
172.25.50.30:37988 -> 172.25.50.10:161
04/12-10:53:13.590408  [**] [1:2010935:2] ET POLICY Suspicious inbound 
to MSSQL port 1433  [**] [Classification: Potentially Bad Traffic] 
[Priority: 2] {TCP} 172.25.50.30:60815 -> 172.25.50.10:1433

  But, why not an alert is fired like a "portscan detected" or something 
similar??

-- 
CL Martinez
carlopmart {at} gmail {d0t} com



More information about the Oisf-users mailing list