Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
| GEN:SID | 1:2123 |
| Message | ATTACK-RESPONSES Microsoft cmd.exe banner |
| Summary | This event is generated when a Windows cmd.exe banner is detected in a TCP session. |
| Impact | Remote access. |
| Detailed Information | This event indicates that a Windows cmd.exe banner has been detected in a TCP session. This indicates that someone has the ability to spawn a DOS command shell prompt over TCP. |
| Affected Systems | Windows operating systems. |
| Attack Scenarios | An attacker could be utilizing a backdoor to spawn a DOS command shell thus gaining access to the operating system and all data on the host. |
| Ease of Attack | Simple. |
| Corrective Action | Check the host for signs of compromise. |
| Additional References | |
| Rule References | nessus: 11633 |
--
DID:898170
--
http://www.aanval.com/