Signature
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"NF - VNC server response"; flow:established; content:"RFB 0"; depth:5; content:".0"; depth:2; offset:7; reference:url,networkforensic.dk; reference:url,doc.emergingthreats.net; metadata:11122018; classtype:misc-activity; sid:5013401; rev:1;)
Recommendations/Investigative actions
Identify the external server or internal device involved in the VNC communication to assess if it’s authorized.
Restrict or block VNC traffic, especially if remote desktop access is not permitted in the network policy.
Investigate the target device for unauthorized access or any potential security vulnerabilities.
Relations to other alerts