""ET EXPLOIT Juniper ScreenOS telnet Backdoor Default Password Attempt""
SID: 2022291
Revision: 1
Class Type: attempted-admin
Metadata: created_at 2015_12_21, cve CVE_2015_7755, updated_at 2015_12_21
Reference:
Protocol: tcp
Source Network: any
Source Port: any
Destination Network: $HOME_NET
Destination Port: 23
Flow: established,to_server
Contents:
- Value: "|3c 3c 3c 20 25 73 28 75 6e 3d 27 25 73 27 29 20 3d 20 25 75|"
Within:
PCRE:
Special Options:
- fast_pattern