""ET EXPLOIT Known Malicious Router DNS Change GET Request""
SID: 2020877
Revision: 1
Class Type: attempted-admin
Metadata: created_at 2015_04_09, updated_at 2015_04_09
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: $HTTP_PORTS
Flow: to_server,established
Contents:
-
Value: "GET"
-
Value: "/router/add_dhcp_segment.cgi?"
-
Value: "is_router_as_dns=1"
-
Value: "&dns1="
-
Value: "submitbutton="
Within:
PCRE:
Special Options:
-
http_method
-
http_uri
-
http_uri
-
http_uri
-
http_uri