EmergingThreats> Main Web>2008011 (revision 1)EditAttach

alert tcp $HOME_NET any -> $EXTERNAL_NET 9000: (msg:"ET TROJAN Pakes/Cutwall/Kobcka Update Detected High Ports"; flow:established,to_server; content:"GET "; depth:4; content:"|0d 0a|Host: "; distance:0; content:"|0d 0a|X-Flags\: "; distance:0; within:40; content:"|0d 0a|X-TM\:"; distance:0; content:"|0d 0a|X-BI\: "; distance:0; classtype:trojan-activity; sid:2008011; rev:1;)

Added 2008-03-17 17:46:41 UTC


Edit | Attach | Print version | History: r2 < r1 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r1 - 2008-03-17 - MattJonkman
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats