I have been running a variety of nmap scans against the SecOnion machine, but the results are rather obtuse and tend to be the same regardless of what scan type I run, such as a basic syn scan, tcp scan, or Christmas scan.
Each time, Snort reports a essentially the same thing:
ET POLICY Suspicious inbound to mySQL port 3306
ET SCAN Potential VNC scan 5900 - 5920
ET POLICY Suspicious inbound to postgreSQL port 5432
ET POLICY Suspicious inbound to Oracle SQL port 1521
ET SCAN Potential VNC scan 5800 - 5820
ET POLICY Suspicious inbound to MSSQL port 1433
I updated the rules with pulledpork using this command:
pulledpork.pl -c /etc/nsm/pulledpork/pulledpork.conf
Are my results typical? Or do I need to do something else to update the Snort rules?
Notes on the set-up:
Both the SecOnion and Kali (for nmap) VMs were set to host only and in the same network during the scans.