alert http $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"Mozilla/5.0 SF"; http_user_agent; threshold:type limit, count 10, seconds 60, track by_src; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; classtype:attempted-recon; sid:2010953; rev:4;)

Added 2014-08-21 18:10:24 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"User-Agent|3A| Mozilla/5.0 SF"; http_header; threshold:type limit, count 10, seconds 60, track by_src; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; classtype:attempted-recon; sid:2010953; rev:4;)

Added 2011-10-12 19:30:59 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"User-Agent|3A| Mozilla/5.0 SF"; http_header; threshold:type limit, count 10, seconds 60, track by_src; classtype:attempted-recon; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; sid:2010953; rev:4;)

Added 2011-09-14 22:44:07 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"User-Agent|3A| Mozilla/5.0 SF"; http_header; threshold:type limit, count 10, seconds 60, track by_src; classtype:attempted-recon; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Skipfish; sid:2010953; rev:4;)

Added 2011-02-04 17:30:39 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"|0d 0a|User-Agent|3A| Mozilla/5.0 SF"; threshold:type limit, count 10, seconds 60, track by_src; classtype:attempted-recon; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Skipfish; sid:2010953; rev:2;)

Added 2010-03-22 15:06:29 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"|0d 0a|User-Agent|3A| Mozilla/5.0 SF"; threshold:type limit, count 10, seconds 60, track by_src; classtype:attempted-recon; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; reference:url,doc.emergingthreats.net/2010953; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Skipfish; sid:2010953; rev:2;)

Added 2010-03-22 15:06:29 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Skipfish Web Application Scan Detected"; flow:established,to_server; content:"GET "; depth:4; uricontent:".old"; content:"|0d 0a|User-Agent|3A| Mozilla/5.0 SF/"; content:"Range|3A| bytes=0-199999"; within:100; threshold:type limit, count 10, seconds 60, track by_src; classtype:attempted-recon; reference:url,isc.sans.org/diary.html?storyid=8467; reference:url,code.google.com/p/skipfish/; sid:2010953; rev:1;)

Added 2010-03-22 10:30:50 UTC


Topic revision: r1 - 2014-08-21 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats