""ET EXPLOIT Pwdump3e pwservice.exe Access port 139""

SID: 2000567

Revision: 9

Class Type: misc-attack

Metadata: created_at 2010_07_30, updated_at 2010_11_04

Reference:

Protocol: tcp

Source Network: any

Source Port: any

Destination Network: $HOME_NET

Destination Port: 139

Flow: to_server,established

Contents:

  • Value: "p|00|w|00|s|00|e|00|r|00|v|00|i|00|c|00|e|00|.|00|e|00|x|00|e"

Within:

PCRE:

Special Options:

source