""ET EXPLOIT Possible Misfortune Cookie RomPager Server banner""
SID: 2020101
Revision: 1
Class Type: trojan-activity
Metadata: created_at 2015_01_06, updated_at 2015_01_06
Reference:
Protocol: tcp
Source Network: any
Source Port: [$HTTP_PORTS,7547]
Destination Network: any
Destination Port: any
Flow: established,from_server
Contents:
- Value: "Server|3a| RomPager"
Within:
PCRE:
Special Options:
- nocase