""ET EXPLOIT Zollard PHP Exploit Telnet Outbound""
SID: 2017800
Revision: 2
Class Type: attempted-user
Metadata: created_at 2013_12_05, updated_at 2014_12_05
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: 23
Flow: to_server,established
Contents:
- Value: "/var/run/.zollard/"
Within:
PCRE:
Special Options: