""ET WEB_SERVER WEBSHELL K-Shell/ZHC Shell 1.0/Aspx Shell Backdoor NetCat_Listener""
SID: 2018369
Revision: 1
Class Type: web-application-attack
Metadata: created_at 2014_04_07, updated_at 2014_04_07
Reference:
Protocol: tcp
Source Network: $HTTP_SERVERS
Source Port: $HTTP_PORTS
Destination Network: $EXTERNAL_NET
Destination Port: any
Flow: established,from_server
Contents:
-
Value: "Silentz's Tricks:"
-
Value: "action=cmd2"
-
Value: "Start NC"
Within:
PCRE:
Special Options:
- file_data