#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; fast_pattern:only; reference:url,doc.emergingthreats.net/2010407; classtype:shellcode-detect; sid:2010407; rev:4;)

Added 2011-10-12 19:29:41 UTC


#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; fast_pattern:only; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010407; sid:2010407; rev:4;)

Added 2011-09-14 22:42:54 UTC


#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; fast_pattern:only; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010407; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010407; rev:4;)

Added 2011-02-04 17:29:56 UTC


#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010407; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010407; rev:2;)

Added 2009-12-01 15:31:31 UTC


#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010407; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010407; rev:2;)

Added 2009-12-01 15:31:31 UTC


#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; classtype:shellcode-detect; sid:2010407; rev:1;)

Added 2009-12-01 14:32:19 UTC


#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (PexFnstenvSub? Encoded 1)"; content:"|c9 83 e9 ef d9 ee d9 74 24 f4 5b 81 73 13|"; classtype:shellcode-detect; sid:2010407; rev:1;)

Added 2009-12-01 14:30:42 UTC


Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats