#alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE x86
PexCall? Encoder"; flow:established; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; classtype:shellcode-detect; sid:2002907; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2018-09-13 19:38:20 UTC
Added 2018-09-13 17:53:00 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE x86
PexCall? Encoder"; flow:established; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; classtype:shellcode-detect; sid:2002907; rev:5; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2017-08-07 20:56:18 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE x86
PexCall? Encoder"; flow:established; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; classtype:shellcode-detect; sid:2002907; rev:5;)
Added 2011-10-12 19:12:29 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE x86
PexCall? Encoder"; flow:established; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; sid:2002907; rev:5;)
Added 2011-09-14 22:25:26 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET SHELLCODE x86
PexCall? Encoder"; flow:established; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2002907; rev:5;)
Added 2011-02-04 17:22:07 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2002907; rev:4;)
Added 2009-07-29 15:22:56 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2002907; rev:4;)
Added 2009-07-29 15:22:56 UTC
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2002907; rev:3;)
Added 2009-02-07 22:00:25 UTC
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; reference:url,doc.emergingthreats.net/bin/view/Main/2002907; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Metasploit_Encoders; sid:2002907; rev:3;)
Added 2009-02-07 22:00:25 UTC
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; sid:2002907; rev:2;)
Added 2008-01-25 10:56:38 UTC
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; sid:2002907; rev:2;)
Added 2008-01-25 10:56:38 UTC
alert ip $EXTERNAL_NET any -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT x86
PexCall? Encoder"; content:"|E8 FF FF FF FF C0 5E 81 76 0E|"; content:"|82 EE FC E2 F4|"; distance: 4; within: 5; classtype:shellcode-detect; sid:2002907; rev:1;)