Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

SSH:MISC:EXPLOIT-CMDS-UNIX

Severity

Major

Recommended

No

Recommended Action

Drop

Category

SSH

Keywords

UNIX Post-Exploit Commands

Release Date

2003/10/15

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

SSH: UNIX Post-Exploit Commands


This signature detects common commands sent in the clear (unencrypted). Attackers often use these commands to verify that they have successfully exploited an SSH vulnerability.

Extended Description

An attacker could send commands to gage the level of access granted and then begin using the compromised system.

References

  • URL: http://www.ietf.org/html.charters/OLD/secsh-charter.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out