EmergingThreats> Main Web>2003447 (revision 1)EditAttach

#alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg: "BLEEDING-EDGE MALWARE Humanclick.com Client Checkin"; flow: to_server,established; uricontent:"/hc/"; nocase; content:"/x.js?"; nocase; content:"cmd=file"; nocase; content:"&file="; nocase; content:"&site="; nocase; classtype: policy-violation; sid: 2003447; rev:1;)

Added 2007-04-13 15:00:23 UTC


alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg: "BLEEDING-EDGE MALWARE Humanclick.com Client Checkin"; flow: to_server,established; uricontent:"/hc/"; nocase; content:"/x.js?"; nocase; content:"cmd=file"; nocase; content:"&file="; nocase; content:"&site="; nocase; classtype: policy-violation; sid: 2003447; rev:1;)



Edit | Attach | Print version | History: r2 < r1 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r1 - 2007-04-13 - MattJonkman
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats