OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself.
OS-WINDOWS Microsoft Windows SMB anonymous session IPC share access attempt
This event is generated when an anonymous SMB session is observed. Impact: Attempted Information Leak Details: Ease of Attack:
This rule alerts when a Windows anonymous SMB session is observed.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Initial Access
Technique: Drive-by Compromise
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org