alert smb any any -> $HOME_NET any (msg:"ET EXPLOIT Possible ETERNALBLUE MSF Probe MS17-010"; flow:to_server,established; content:"|ff|SMB|25 00 00 00 00 18 01 28|"; offset:4; depth:12; content:"|00 00 00 00 00 00 00 00 00 00|"; distance:2; within:10; content:"|23 00 00 00 07 00 5c 50 49 50 45 5c 00|"; fast_pattern; isdataat:!1,relative; threshold: type limit, track by_src, count 1, seconds 30; metadata: former_category EXPLOIT; reference:url,github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/smb/smb_ms17_010.rb; classtype:trojan-activity; sid:2025649; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Internal, tag Metasploit, tag ETERNALBLUE, signature_severity Major, created_at 2018_07_11, updated_at 2018_07_11;)

Added 2018-07-11 17:47:44 UTC


Topic revision: r1 - 2018-07-11 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats