""ET SCAN RDP Connection Attempt from Nmap""

SID: 2036252

Revision: 1

Class Type: network-scan

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_and_Server, created_at 2022_04_19, deployment Perimeter, deployment Internal, performance_impact Low, signature_severity Minor, updated_at 2022_04_19

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: any

Destination Port: 3389

Flow: established,to_server

Contents:

  • Value: "|00 00 00 00 00|Cookie|3a 20|mstshash|3d|nmap|0d 0a|"

Within:

PCRE:

Special Options:

  • fast_pattern

source