""ET EXPLOIT Pwdump3e pwservice.exe Access port 139""
SID: 2000567
Revision: 9
Class Type: misc-attack
Metadata: created_at 2010_07_30, updated_at 2010_11_04
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: 139
Flow: to_server,established
Contents:
- Value: "p|00|w|00|s|00|e|00|r|00|v|00|i|00|c|00|e|00|.|00|e|00|x|00|e"
Within:
PCRE:
Special Options: