""ET EXPLOIT Pwdump3e Password Hash Retrieval port 139""
SID: 2000568
Revision: 11
Class Type: misc-attack
Metadata: created_at 2010_07_30, updated_at 2010_11_04
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: 139
Destination Network: any
Destination Port: any
Flow: from_server,established
Contents:
- Value: "|3a 00|5|00|0|00|0|3a|"
Within:
PCRE:
Special Options: