Skip to content
CyberOpsSec
CyberOpsSec

Just another cybersecurity site

  • Home
  • Posts
  • Knowledge
    • Auditing
    • Linux Commands
    • Ports & Protocols
    • Scanning
    • Sniffing
    • Syslog
    • Vulnerability/Patch Mgmt
  • About
  • Contact
CyberOpsSec

Just another cybersecurity site

ICMP Timestamp Request Remote Date Disclosure

Admin, May 8, 2024June 5, 2024

You may have seen this vulnerability pop in Nessus. In order to remediate this we will need to block ICMP type 13 inbound to our boxes.

To test this we can use the hping3 tool. Hping3 documentation states you can test for this ICMP type with the –icmp-ts command. In the screen shot you can see the IP responding to Type 13 requests.

I will be creating a firewall rule in my EDR software (which controls the Windows firewall) to block this. This can be done with any host based firewall software.

After the host based firewall rule has been set:

I have Windows auditing enabled for EventID 5157. We can now verify this is blocked.

Vulnerabilities

Post navigation

Previous post
Next post

Related Posts

Rolling KRBTGT Account

September 30, 2024November 8, 2024

It is best practice to roll this account’s password every 180 days or immediately if…

Read More

Uninstall Vulnerable Software Remotely

May 8, 2024June 5, 2024

If you find a ton of boxes running vulnerable software that is no longer used…

Read More

Disable mDNS

March 13, 2024

Issuing netstat and lsof commands to view UDP 5353 connections/listening ports shows that the avahi-daemon…

Read More

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

  • UBI – User Browsing Isolation
  • Rolling KRBTGT Account
  • SentinelOne: Why it’s important to monitor and audit your EPP
  • Nessus False Positive
  • Uninstall Vulnerable Software Remotely

Recent Comments

No comments to show.

Archives

  • November 2024
  • September 2024
  • June 2024
  • May 2024
  • March 2024
  • January 2024
  • November 2023
  • September 2023

Categories

  • EPP
  • Uncategorized
  • Vulnerabilities
©2025 CyberOpsSec | WordPress Theme by SuperbThemes