alert http any any -> $HOME_NET any (msg:"ET EXPLOIT HackingTrio? UA (Hello, World)"; flow:established,to_server; content:"POST"; http_method; content:"Hello, World"; http_user_agent; fast_pattern; isdataat:!1,relative; metadata: former_category EXPLOIT; reference:cve,2018-10561; reference:cve,2018-10562; reference:url,github.com/f3d0x0/GPON; classtype:attempted-admin; sid:2025576; rev:2; metadata:attack_target IoT?, deployment Perimeter, tag GPON, signature_severity Major, created_at 2018_05_11, performance_impact Low, updated_at 2018_05_15;)

Added 2018-05-16 17:40:53 UTC

Hundreds of false positives a week

-- AndrewArmstrong - 2018-09-21

^Thousands**

-- AndrewArmstrong - 2018-09-21


alert http any any -> $HOME_NET any (msg:"ET EXPLOIT HackingTrio? UA (Hello, World)"; flow:established,to_server; content:"POST"; http_method; content:"Hello, World"; http_user_agent; fast_pattern; isdataat:!1,relative; metadata: former_category EXPLOIT; reference:cve,2018-10561; reference:cve,2018-10562; reference:url,github.com/f3d0x0/GPON; classtype:attempted-admin; sid:2025576; rev:1; metadata:attack_target IoT?, deployment Perimeter, tag GPON, signature_severity Major, created_at 2018_05_11, performance_impact Low, updated_at 2018_05_15;)

Added 2018-05-15 17:11:48 UTC


alert http any any -> $HOME_NET any (msg:"ET USER_AGENTS HackingTrio? UA (Hello, World)"; flow:established,to_server; content:"POST"; http_method; content:"Hello, World"; http_user_agent; fast_pattern; isdataat:!1,relative; metadata: former_category USER_AGENTS; classtype:trojan-activity; sid:2025576; rev:1; metadata:attack_target Client_and_Server, deployment Perimeter, signature_severity Major, created_at 2018_05_11, performance_impact Low, updated_at 2018_05_11;)

Added 2018-05-11 17:19:26 UTC


Topic revision: r2 - 2018-09-21 - AndrewArmstrong
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats