""ET WEB_CLIENT Metasploit Browser Autopwn Aug1 2016""

SID: 2023014

Revision: 1

Class Type: attempted-admin

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2016_08_02, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2016_08_02

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,from_server

Contents:

  • Value: "|65 78 70 6c 6f 69 74 4c 69 73 74 2e 73 70 6c 69 63 65|"

  • Value: "|73 65 74 54 69 6d 65 6f 75 74 28 22 6c 6f 61 64 45 78 70 6c 6f 69 74 28 29 22|"

Within:

PCRE:

Special Options:

  • file_data

  • nocase

  • nocase

source