""ET WEB_SERVER WEBSHELL K-Shell/ZHC Shell 1.0/Aspx Shell Backdoor NetCat_Listener""

SID: 2018369

Revision: 1

Class Type: web-application-attack

Metadata: created_at 2014_04_07, updated_at 2014_04_07

Reference:

Protocol: tcp

Source Network: $HTTP_SERVERS

Source Port: $HTTP_PORTS

Destination Network: $EXTERNAL_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "Silentz's Tricks:"

  • Value: "action=cmd2"

  • Value: "Start NC"

Within:

PCRE:

Special Options:

  • file_data

source