alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Generic ADSL Router DNS Change Request"; flow:to_server,established; content:"dnsPrimary="; http_uri; fast_pattern; content:"dnsSecondary="; http_uri; content:"Enable_DNSFollowing=1"; http_uri; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2025222; rev:3; metadata:affected_product D_Link_DSL_2640R, attack_target IoT?, deployment Perimeter, signature_severity Major, created_at 2018_01_19, performance_impact Low, updated_at 2019_10_07;)

Added 2019-10-08 19:34:47 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Generic ADSL Router DNS Change Request"; flow:to_server,established; content:"dnsPrimary="; http_uri; fast_pattern:only; content:"dnsSecondary="; http_uri; content:"Enable_DNSFollowing=1"; http_uri; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2025222; rev:2; metadata:affected_product D_Link_DSL_2640R, attack_target IoT?, deployment Perimeter, signature_severity Major, created_at 2018_01_19, performance_impact Low, updated_at 2018_01_19;)

Added 2018-09-13 19:54:29 UTC


Added 2018-09-13 18:02:01 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Generic ADSL Router DNS Change Request"; flow:to_server,established; content:"dnsPrimary="; http_uri; fast_pattern:only; content:"dnsSecondary="; http_uri; content:"Enable_DNSFollowing=1"; http_uri; metadata: former_category EXPLOIT; classtype:attempted-user; sid:2025222; rev:2; metadata:affected_product D_Link_DSL_2640R, attack_target IoT?, deployment Perimeter, signature_severity Major, created_at 2018_01_19, performance_impact Low, updated_at 2018_01_19;)

Added 2018-01-19 16:19:51 UTC


Topic revision: r1 - 2019-10-08 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats