#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET DELETED METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; reference:url,doc.emergingthreats.net/2010408; classtype:shellcode-detect; sid:2010408; rev:3; metadata:affected_product Any, attack_target Client_and_Server, deployment Perimeter, deployment Internet, deployment Internal, deployment Datacenter, tag Metasploit, signature_severity Critical, created_at 2010_07_30, updated_at 2016_07_01;)
Added 2017-08-07 21:03:32 UTC
##alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET DELETED METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; reference:url,doc.emergingthreats.net/2010408; classtype:shellcode-detect; sid:2010408; rev:3;)
Added 2015-04-17 23:19:03 UTC
#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; fast_pattern:only; reference:url,doc.emergingthreats.net/2010408; classtype:shellcode-detect; sid:2010408; rev:4;)
Added 2011-10-12 19:29:41 UTC
#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; fast_pattern:only; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010408; sid:2010408; rev:4;)
Added 2011-09-14 22:42:54 UTC
#alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; fast_pattern:only; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010408; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010408; rev:4;)
Added 2011-02-04 17:29:56 UTC
#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010408; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010408; rev:2;)
Added 2009-12-01 15:31:31 UTC
#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/2010408; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2010408; rev:2;)
Added 2009-12-01 15:31:31 UTC
#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; classtype:shellcode-detect; sid:2010408; rev:1;)
Added 2009-12-01 14:32:19 UTC
#alert ip $EXTERNAL_NET $SHELLCODE_PORTS -> $HOME_NET any (msg:"ET EXPLOIT METASPLOIT BSD Reverse shell (
PexFnstenvSub? Encoded 2)"; content:"|83 eb fc e2 f4|"; classtype:shellcode-detect; sid:2010408; rev:1;)
Added 2009-12-01 14:30:42 UTC