""ET WEB_CLIENT Generic Email Spoofing Tool Accessed on External Compromised Server""
SID: 2030247
Revision: 2
Class Type: web-application-attack
Metadata: affected_product Web_Server_Applications, attack_target Web_Server, created_at 2020_06_03, deployment Perimeter, signature_severity Major, updated_at 2020_06_03
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "
Email Spoofer" -
Value: "id=|22|title|22|>Email Spoofer"
-
Value: "id=|22|from|22 20|placeholder=|22 20|Email Spoofed"
-
Value: "id=|22|name|22 20|placeholder=|22|Name Spoofed"
-
Value: "var mailist = $(|22|#to|22|).val().split("
Within:
PCRE:
Special Options:
- file_data