home *** CD-ROM | disk | FTP | other *** search
Wrap
<IdsSignatureLib> <Version>1.0.1000</Version> <SerialNumber>1.0.1007</SerialNumber> <IdsGlobal> <IdsSignatureGroupZone> <IdsSignatureGroup Id="00000000000000000011000C00000000" Name="SVCHOST_group" Enable="1" Severity="1" Description="SVCHOST_group" ApplicationGroupLink="APP_SVCHOST"> <IdsSignature Id="00000000000000000011000C00000001" Name="UPnP Location overflow" Enable="1" Severity="10" Description="UPnP Location overflow"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, dest=(1900), msg="E230010 MISC UPnP Location overflow", content="Location\x3A"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000C00000002" Name="UPnP malformed advertisement" Enable="1" Severity="10" Description="UPnP malformed advertisement"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, dest=(1900), msg="E230011 MISC UPnP malformed advertisement", content="NOTIFY * "</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> </IdsSignatureGroup> <IdsSignatureGroup Id="00000000000000000011000300000000" Name="IISweb_GROUP" Enable="1" Severity="1" Description="IIS IDS signature group" ApplicationGroupLink="APP_IIS_WEB"> <IdsSignature Id="00000000000000000011000300000001" Name="File Permission Canonicalization" Enable="1" Severity="11" Description="File Permission Canonicalization(Chinese charset)" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="E10000 WEB-IIS File permission canonicalization(Chinese charset)", content="/scripts/..%c1%1c../", tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000002" Name="File permission canonicalization" Enable="1" Severity="11" Description="File permission canonicalization %c1%9c" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="E10001 WEB-IIS File permission canonicalization", content="/scripts/..%c1%9c../", tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000003" Name="File permission canonicalization" Enable="1" Severity="11" Description="File permission canonicalization %c0%af" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="E10002 WEB-IIS File permission canonicalization", content="/scripts/..%c0%af../", tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000006" Name="Viewcode access" Enable="1" Severity="11" Description="Viewcode access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="D10006 WEB-IIS showcode access", content="/Sites/Samples/Knowledge/Push/ViewCode.asp"H, tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000007" Name="Jet VBA access" Enable="1" Severity="11" Description="Jet VBA access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="D10007 WEB-IIS JET VBA access", tcp_flag&ack, content="/scripts/samples/details.idc"H</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000008" Name="newdsn.exe access" Enable="1" Severity="11" Description="newdsn.exe access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="D10008 WEB-IIS newdsn.exe access",tcp_flag&ack, content="/scripts/tools/newdsn.exe"H</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000009" Name="Jet VBA access 2" Enable="1" Severity="11" Description="Jet VBA access (ctguestb.idc)" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="D10009 WEB-IIS JET VBA access",tcp_flag&ack, content="/scripts/samples/ctguestb.idc"H</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000000A" Name="Jet VBA access 3" Enable="1" Severity="11" Description="Jet VBA access (catalog_type.asp)" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg="D10010 WEB-IIS jet vba access",tcp_flag&ack, content="/advworks/equipment/catalog_type.asp"H</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000000B" Name="WEB-FRONTPAGE _vti_rpc access" Enable="1" Severity="10" Description="WEB-FRONTPAGE _vti_rpc access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11500 WEB-FRONTPAGE _vti_rpc access",tcp_flag&ack,content="/_vti_rpc"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000000E" Name="WEB-FRONTPAGE shtml.dll" Enable="1" Severity="10" Description="WEB-FRONTPAGE shtml.dll" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11503 WEB-FRONTPAGE shtml.dll",content="/_vti_bin/shtml.dll",tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000000F" Name="WEB-FRONTPAGE contents.htm access" Enable="1" Severity="10" Description="WEB-FRONTPAGE contents.htm access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11504 WEB-FRONTPAGE contents.htm access",tcp_flag&ack,content="/admcgi/contents.htm"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000010" Name="WEB-FRONTPAGE orders.htm access" Enable="1" Severity="10" Description="WEB-FRONTPAGE orders.htm access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11505 WEB-FRONTPAGE orders.htm access",tcp_flag&ack,content="/_private/orders.htm"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000015" Name="WEB-FRONTPAGE orders.txt access" Enable="1" Severity="10" Description="WEB-FRONTPAGE orders.txt access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11510 WEB-FRONTPAGE orders.txt access",tcp_flag&ack,content="/_private/orders.txt"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000016" Name="WEB-FRONTPAGE form_results access" Enable="1" Severity="10" Description="WEB-FRONTPAGE form_results access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11511 WEB-FRONTPAGE form_results access",tcp_flag&ack,content="/_private/form_results.txt"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000017" Name="WEB-FRONTPAGE registrations.htm access" Enable="1" Severity="10" Description="WEB-FRONTPAGE registrations.htm access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11512 WEB-FRONTPAGE registrations.htm access",tcp_flag&ack,content="/_private/registrations.htm"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000001C" Name="WEB-FRONTPAGE form_results.htm access" Enable="1" Severity="10" Description="WEB-FRONTPAGE form_results.htm access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11517 WEB-FRONTPAGE form_results.htm access",tcp_flag&ack,content="/_private/form_results.htm"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000001D" Name="WEB-FRONTPAGE access.cnf access" Enable="1" Severity="10" Description="WEB-FRONTPAGE access.cnf access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11518 WEB-FRONTPAGE access.cnf access",tcp_flag&ack,content="/_vti_pvt/access.cnf"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000001E" Name="WEB-FRONTPAGE register.txt access" Enable="1" Severity="10" Description="WEB-FRONTPAGE register.txt access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11519 WEB-FRONTPAGE register.txt access",tcp_flag&ack,content="/_private/register.txt"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000001F" Name="WEB-FRONTPAGE registrations.txt access" Enable="1" Severity="10" Description="WEB-FRONTPAGE registrations.txt access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11520 WEB-FRONTPAGE registrations.txt access",tcp_flag&ack,content="/_private/registrations.txt"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000020" Name="WEB-FRONTPAGE service.cnf access" Enable="1" Severity="10" Description="WEB-FRONTPAGE service.cnf access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11521 WEB-FRONTPAGE service.cnf access",tcp_flag&ack,content="/_vti_pvt/service.cnf"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000022" Name="WEB-FRONTPAGE service.stp access" Enable="1" Severity="10" Description="WEB-FRONTPAGE service.stp access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11523 WEB-FRONTPAGE service.stp access",tcp_flag&ack,content="/_vti_pvt/service.stp"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000023" Name="WEB-FRONTPAGE services.cnf access" Enable="1" Severity="10" Description="WEB-FRONTPAGE services.cnf access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11524 WEB-FRONTPAGE services.cnf access",tcp_flag&ack,content="/_vti_pvt/services.cnf"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000025" Name="WEB-FRONTPAGE svcacl.cnf access" Enable="1" Severity="10" Description="WEB-FRONTPAGE svcacl.cnf access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11526 WEB-FRONTPAGE svcacl.cnf access",tcp_flag&ack,content="/_vti_pvt/svcacl.cnf"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000027" Name="WEB-FRONTPAGE writeto.cnf access" Enable="1" Severity="10" Description="WEB-FRONTPAGE writeto.cnf access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11528 WEB-FRONTPAGE writeto.cnf access",tcp_flag&ack,content="_vti_pvt/writeto.cnf"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000300000028" Name="WEB-FRONTPAGE fourdots request" Enable="1" Severity="10" Description="WEB-FRONTPAGE fourdots request" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11529 WEB-FRONTPAGE fourdots request",tcp_flag&ack,content="\x2e\x2e\x2e\x2e\x2f"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000002A" Name="WEB-FRONTPAGE register.htm access" Enable="1" Severity="10" Description="WEB-FRONTPAGE register.htm access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D11531 WEB-FRONTPAGE register.htm access",tcp_flag&ack,content="/_private/register.htm"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100030000002B" Name="webhits.exe access" Enable="1" Severity="11" Description="webhits.exe access attack" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,msg="D12016 WEB-MISC webhits.exe access",tcp_flag&ack,content="/scripts/samples/search/webhits.exe"H</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> </IdsSignatureGroup> <IdsSignatureGroup Id="00000000000000000011000800000000" Name="IDS Trojan Group" Enable="1" Severity="2" Description="IDS signature for Trojans" ApplicationGroupLink="APP_OTHER"> <IdsSignature Id="00000000000000000011000800000001" Name="Possible QAZ worm infection" Enable="1" Severity="10" Description="Possible QAZ worm infection" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D20000 Virus - Possible QAZ Worm Infection",tcp_flag&ack, content="\x71\x61\x7a\x77\x73\x78\x2e\x68\x73\x71"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000002" Name="BackDoor Dagger_1.4.0_client_connect" Enable="1" Severity="10" Description="BackDoor Dagger_1.4.0_client_connect" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, source=(1024-65535), dest=(2589), msg= "E20004 BACKDOOR - Dagger_1.4.0_client_connect", tcp_flag&ack, content="\x0b\x00\x00\x00\x07\x00\x00\x00Connect"C(0,16)</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000003" Name="BACKDOOR - Dagger_1.4.0" Enable="1" Severity="10" Description="BACKDOOR - Dagger_1.4.0" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(2589), dest=(1024-65535), msg= "E20005 BACKDOOR - Dagger_1.4.0", tcp_flag&ack, content="\x32\x00\x00\x00\x06\x00\x00\x00Drives\x24\x00"C(0,16)</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000004" Name="BACKDOOR subseven DEFCON8 2.1" Enable="1" Severity="10" Description="BACKDOOR subseven DEFCON8 2.1 access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, source=(16959), msg="E20007 BACKDOOR subseven DEFCON8 2.1 access", content="PWD", content="acidphreak", tcp_flag&ack </IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000005" Name=" QAZ Worm" Enable="1" Severity="10" Description=" QAZ Worm Client Login access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(7597), msg="E20009 BACKDOOR QAZ Worm Client Login access", tcp_flag&ack, content="\x71\x61\x7a\x77\x73\x78\x2e\x68\x73\x71"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000006" Name=" BACKDOOR netbus" Enable="1" Severity="10" Description=" BACKDOOR netbus active" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(12345), msg="E20010 BACKDOOR netbus active", tcp_flag&ack, content="NetBus"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000007" Name=" BACKDOOR netbus" Enable="1" Severity="10" Description=" BACKDOOR netbus getinfo" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(12345,12346), msg="E20011 BACKDOOR netbus getinfo", tcp_flag&ack, content="GetInfo\x0d"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000008" Name="BACKDOOR BackOrifice" Enable="1" Severity="10" Description="BACKDOOR BackOrifice access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(80), msg="E20012 BACKDOOR BackOrifice access", tcp_flag&ack, content="server\x3aBO\x2f"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000009" Name="BACKDOOR DeepThroat" Enable="1" Severity="10" Description="BACKDOOR DeepThroat access"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(4120), msg="E20013 BACKDOOR DeepThroat access", content="--Ahhhhhhhhhh"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000A" Name=" BACKDOOR netbus" Enable="1" Severity="10" Description=" BACKDOOR netbus active" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(12346), msg="E20014 BACKDOOR netbus active", tcp_flag&ack, content="NetBus"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000B" Name=" BACKDOOR netbus" Enable="1" Severity="10" Description=" BACKDOOR netbus active" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(20034), msg="E20015 BACKDOOR netbus active", tcp_flag&ack, content="NetBus"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000C" Name=" BACKDOOR BackOrifice" Enable="1" Severity="10" Description=" BACKDOOR BackOrifice access" HostType="PASSIVE"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, dest=(31337), msg="E20016 BACKDOOR BackOrifice access", content="\xce\x63\xd1\xd2\x16\xe7\x13\xcf\x39\xa5\xa5\x86"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000D" Name="BACKDOOR Infector.1.x" Enable="1" Severity="10" Description="BACKDOOR Infector.1.x" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(146), dest=(1024), msg="E20017 BACKDOOR Infector.1.x", content="WHATISIT"C, tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000E" Name="BACKDOOR SatansBackdoor.2.0.Beta" Enable="1" Severity="10" Description="BACKDOOR SatansBackdoor.2.0.Beta" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(666), dest=(1024), msg="E20018 BACKDOOR SatansBackdoor.2.0.Beta", content="Remote\x3A You are connected to me."C, tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000000F" Name=" BACKDOOR Doly 2.0 access" Enable="1" Severity="10" Description=" BACKDOOR Doly 2.0 access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(6789), msg="E20019 BACKDOOR Doly 2.0 access", content="\x57\x74\x7a\x75\x70\x20\x55\x73\x65"C(0,32), tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000010" Name=" BACKDOOR Infector 1.6" Enable="1" Severity="10" Description="BACKDOOR Infector 1.6 Server to Client" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(146), dest=(1000-1300), msg="E20020 BACKDOOR Infector 1.6 Server to Client", content="\x57\x48\x41\x54\x49\x53\x49\x54"C, tcp_flag&ack </IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000011" Name="BACKDOOR Infector 1.6" Enable="1" Severity="10" Description="BACKDOOR Infector 1.6 Client to Server" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, source=(1000-1300), dest=(146), msg="E20021 BACKDOOR Infector 1.6 Client to Server Connection Request", content="\x46\x43\x20"C, tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000012" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 System Info Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20022 BACKDOOR DeepThroat 3.1 System Info Client Request", content="13"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000013" Name="DeepThroat 3.1" Enable="1" Severity="10" Description="DeepThroat 3.1 Server FTP Port Change Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20023 BACKDOOR DeepThroat 3.1 Server FTP Port Change Client Request", content="21"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000014" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 FTP Status Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20024 BACKDOOR DeepThroat 3.1 FTP Status Client Request", content="09"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000015" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 E-Mail Info From Server"> <IdsTrafficCondition>rule udp, saddr=$LOCALHOST, source=(2140), dest=(60000), msg="E20025 BACKDOOR DeepThroat 3.1 E-Mail Info From Server", content="Retreaving"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000016" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 E-Mail Info Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20026 BACKDOOR DeepThroat 3.1 E-Mail Info Client Request", content="12"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000017" Name=" BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description=" BACKDOOR DeepThroat 3.1 Server Status From Server"> <IdsTrafficCondition>rule udp, saddr=$LOCALHOST, source=(2140), dest=(60000), msg="E20027 BACKDOOR DeepThroat 3.1 Server Status From Server", content="Host"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000018" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Server Status Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20028 BACKDOOR DeepThroat 3.1 Server Status Client Request", content="10"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000019" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Drive Info From Server"> <IdsTrafficCondition>rule udp, saddr=$LOCALHOST, source=(2140), dest=(60000), msg="E20029 BACKDOOR DeepThroat 3.1 Drive Info From Server", content="C - "C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001A" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 System Info From Server"> <IdsTrafficCondition>rule udp, saddr=$LOCALHOST, source=(2140), dest=(60000), msg="E20030 BACKDOOR DeepThroat 3.1 System Info From Server", content="Comp Name"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001B" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Drive Info Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20031 BACKDOOR DeepThroat 3.1 Drive Info Client Request", content="130"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001C" Name=" BACKDOOR HackAttack 1.20" Enable="1" Severity="10" Description=" BACKDOOR HackAttack 1.20 Connect" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(31785), msg="E20041 BACKDOOR HackAttack 1.20 Connect", tcp_flag&ack, content="host"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001D" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 ICQ Alert ON Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20042 BACKDOOR DeepThroat 3.1 ICQ Alert ON Client Request", content= "40"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001E" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Change Wallpaper Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20043 BACKDOOR DeepThroat 3.1 Change Wallpaper Client Request", content="20"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000001F" Name="BACKDOOR ADMw0rm" Enable="1" Severity="10" Description="BACKDOOR ADMw0rm ftp retrieval"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(21), msg="E20044 BACKDOOR ADMw0rm ftp retrieval",tcp_flag&ack, content="USERw0rm\x0D\x0A"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000020" Name="BACKDOOR GirlFriendaccess" Enable="1" Severity="10" Description="BACKDOOR GirlFriendaccess" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, source=(0-79,81-65535), dest=(21554), msg="E20045 BACKDOOR GirlFriendaccess", tcp_flag&ack, content="Girl"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000021" Name="BACKDOOR NetSphere access" Enable="1" Severity="10" Description="BACKDOOR NetSphere access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(30100), msg="E20046 BACKDOOR NetSphere access", tcp_flag&ack, content="NetSphere"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000022" Name="BACKDOOR GateCrasher" Enable="1" Severity="10" Description="BACKDOOR GateCrasher" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(6969), msg="E20047 BACKDOOR GateCrasher", tcp_flag&ack, content="GateCrasher"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000023" Name="BACKDOOR BackConstruction 2.1 Connection" Enable="1" Severity="10" Description="BACKDOOR BackConstruction 2.1 Connection" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(5401-5402), msg="E20052 BACKDOOR BackConstruction 2.1 Connection", tcp_flag&ack, content="c\x3A\\"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000024" Name="BACKDOOR DonaldDick 1.53" Enable="1" Severity="10" Description="BACKDOOR DonaldDick 1.53 Traffic"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(23476), msg="E20053 BACKDOOR DonaldDick 1.53 Traffic", tcp_flag&ack, content="pINg"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000025" Name="BACKDOOR NetSphere 1.31.337 access" Enable="1" Severity="10" Description="BACKDOOR NetSphere 1.31.337 access"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(30100-30102), msg="E20055 BACKDOOR NetSphere 1.31.337 access", tcp_flag&ack, content="NetSphere"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000026" Name=" DeepThroat 3.1" Enable="1" Severity="10" Description=" DeepThroat 3.1 Visible Window List Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20056 BACKDOOR DeepThroat 3.1 Visible Window List Client Request", content="37"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000027" Name="BACKDOOR BackConstruction 2.1" Enable="1" Severity="10" Description="BACKDOOR BackConstruction 2.1 Client FTP Open Request"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(666), msg="E20057 BACKDOOR BackConstruction 2.1 Client FTP Open Request", tcp_flag&ack, content="FTPON"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000028" Name="BACKDOOR BackConstruction 2.1" Enable="1" Severity="10" Description="BACKDOOR BackConstruction 2.1 Server FTP Open Reply"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(666), msg="E20058 BACKDOOR BackConstruction 2.1 Server FTP Open Reply", tcp_flag&ack, content="FTP Port open"C </IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000029" Name="BACKDOOR NetMetro File List" Enable="1" Severity="10" Description="BACKDOOR NetMetro File List"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, dest=(5032), msg="E20059 BACKDOOR NetMetro File List", tcp_flag&ack, content="\x2D\x2D"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000002B" Name="BACKDOOR Matrix 2.0 Client connect" Enable="1" Severity="10" Description="BACKDOOR Matrix 2.0 Client connect"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(3344), dest=(3345), msg="E20061 BACKDOOR Matrix 2.0 Client connect", content="activate"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000002C" Name="BACKDOOR Matrix 2.0 Server access" Enable="1" Severity="10" Description="BACKDOOR Matrix 2.0 Server access"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(3345), dest=(3344), msg="E20062 BACKDOOR Matrix 2.0 Server access", content="logged in"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000002D" Name="BACKDOOR WinCrash 1.0 Server Active" Enable="1" Severity="10" Description="BACKDOOR WinCrash 1.0 Server Active"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(5714), msg="E20063 BACKDOOR WinCrash 1.0 Server Active" , tcp_flag&syn|ack, content="\xB4\xB4"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000002E" Name="BACKDOOR DeepThroat 3.1 Server Active on Network" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Server Active on Network"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(2140), dest=(60000), msg="E20064 BACKDOOR DeepThroat 3.1 Server Active on Network"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000002F" Name="BACKDOOR DeepThroat 3.1 Keylogger on Server ON" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Keylogger on Server ON"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20065 BACKDOOR DeepThroat 3.1 Keylogger on Server ON", content="KeyLogger Is Enabled On port"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000030" Name="DeepThroat 3.1 Show Picture Client Request" Enable="1" Severity="10" Description="DeepThroat 3.1 Show Picture Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20066 BACKDOOR DeepThroat 3.1 Show Picture Client Request", content="22"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000031" Name="BACKDOOR DeepThroat 3.1 Hide/Show Clock Client Request" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide/Show Clock Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20067 BACKDOOR DeepThroat 3.1 Hide/Show Clock Client Request", content="32"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000032" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide/Show Desktop Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20068 BACKDOOR DeepThroat 3.1 Hide/Show Desktop Client Request", content="33"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000033" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20069 BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request", content="34"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000034" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Enable/Disable CTRL-ALT-DEL Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20070 BACKDOOR DeepThroat 3.1 Enable/Disable CTRL-ALT-DEL Client Request", content="110"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000035" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Freeze Mouse Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20071 BACKDOOR DeepThroat 3.1 Freeze Mouse Client Request", content="35"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000036" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Show Dialog Box Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20072 BACKDOOR DeepThroat 3.1 Show Dialog Box Client Request", content="70"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000037" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Show Replyable Dialog Box Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20073 BACKDOOR DeepThroat 3.1 Show Replyable Dialog Box Client Request", content="71"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000038" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20074 BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request", content="31"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000039" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Resolution Change Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20075 BACKDOOR DeepThroat 3.1 Resolution Change Client Request", content="125"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003A" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20076 BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request", content="04"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003B" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Keylogger on Server OFF"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20077 BACKDOOR DeepThroat 3.1 Keylogger on Server OFF", content="KeyLogger Shut Down"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003C" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Send to URL Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20078 BACKDOOR DeepThroat 3.1 Send to URL Client Request", content="12"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003D" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 FTP Server Port Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20079 BACKDOOR DeepThroat 3.1 FTP Server Port Client Request", content="21"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003E" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Process List Client request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20080 BACKDOOR DeepThroat 3.1 Process List Client request", content="64"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000003F" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Close Port Scan Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20081 BACKDOOR DeepThroat 3.1 Close Port Scan Client Request", content="121"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000040" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Registry Add Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20082 BACKDOOR DeepThroat 3.1 Registry Add Client Request", content="89"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000041" Name="BACKDOOR CDK" Enable="1" Severity="10" Description="BACKDOOR CDK"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(79), msg="E20085 BACKDOOR CDK", content= "ypi0ca"(0,15), tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000042" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Monitor on/off Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20086 BACKDOOR DeepThroat 3.1 Monitor on/off Client Request", content="07"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000043" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="11" Description="BACKDOOR DeepThroat 3.1 Delete File Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20087 BACKDOOR DeepThroat 3.1 Delete File Client Request", content="41"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000044" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Kill Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20088 BACKDOOR DeepThroat 3.1 Kill Window Client Request", content="38"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000045" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Disable Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20089 BACKDOOR DeepThroat 3.1 Disable Window Client Request", content="23"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000046" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Enable Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20090 BACKDOOR DeepThroat 3.1 Enable Window Client Request", content="24"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000047" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Change Window Title Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20091 BACKDOOR DeepThroat 3.1 Change Window Title Client Request", content="60"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000048" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20092 BACKDOOR DeepThroat 3.1 Hide Window Client Request", content="26"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000049" Name="BACKDOOR DeepThroat 3.1 Show Window Client Request" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Show Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20093 BACKDOOR DeepThroat 3.1 Show Window Client Request", content="25"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004A" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Send Text to Window Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20094 BACKDOOR DeepThroat 3.1 Send Text to Window Client Request", content="63"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004B" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Server Response"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20095 BACKDOOR DeepThroat 3.1 Server Response", content="Ahhhh My Mouth Is Open"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004C" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Hide/Show Systray Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20096 BACKDOOR DeepThroat 3.1 Hide/Show Systray Client Request", content="30"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004D" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 All Window List Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20098 BACKDOOR DeepThroat 3.1 All Window List Client Request", content="370"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004E" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Play Sound Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20099 BACKDOOR DeepThroat 3.1 Play Sound Client Request", content="36"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100080000004F" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Run Program Normal Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20100 BACKDOOR DeepThroat 3.1 Run Program Normal Client Request", content="14"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000050" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Run Program Hidden Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20101 BACKDOOR DeepThroat 3.1 Run Program Hidden Client Request", content="15"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000051" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Get NET File Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20102 BACKDOOR DeepThroat 3.1 Get NET File Client Request", content="100"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000052" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Find File Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20103 BACKDOOR DeepThroat 3.1 Find File Client Request", content="117"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000053" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 Find File Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20104 BACKDOOR DeepThroat 3.1 Find File Client Request", content="118"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000054" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 HUP Modem Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20105 BACKDOOR DeepThroat 3.1 HUP Modem Client Request", content="199"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000055" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 CD ROM Open Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20106 BACKDOOR DeepThroat 3.1 CD ROM Open Client Request", content="02"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000056" Name="BACKDOOR DeepThroat 3.1" Enable="1" Severity="10" Description="BACKDOOR DeepThroat 3.1 CD ROM Close Client Request"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST, source=(60000), dest=(2140), msg="E20107 BACKDOOR DeepThroat 3.1 CD ROM Close Client Request", content="03"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000057" Name="BACKDOOR PhaseZero Server" Enable="1" Severity="10" Description="BACKDOOR PhaseZero Server Active on Network"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, source=(555), msg="E20108 BACKDOOR PhaseZero Server Active on Network", tcp_flag&ack, content="phAse"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000062" Name="BACKDOOR NetBus Pro 2.1" Enable="1" Severity="10" Description="BACKDOOR NetBus Pro 2.1"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, msg= "E20204 BACKDOOR NetBus Pro 2.1 connection attempt", tcp_flag&ack, content="\x05\x00\x41\x0c\x69\x1f\x5d\x12\x61\x82\xa4\x70\xaa\x7d\xa8\x7e\x86\xba\x6e\x91\x20\xd0\xb1"C(8,23)</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000800000063" Name="SubSeven 2.2 server response" Enable="1" Severity="10" Description="SubSeven 2.2 server response"> <IdsTrafficCondition>rule tcp, saddr=$LOCALHOST, msg= "E20205 BACKDOOR SubSeven 2.2 server response", tcp_flag&ack, content="\x0d\x0a\x5b\x52\x50\x4c\x5d\x30\x30\x32\x0d\x0a"C(0,12)</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> </IdsSignatureGroup> <IdsSignatureGroup Id="00000000000000000011000400000000" Name="IDS-DoS" Enable="1" Severity="1" Description="DoS IDS Signature Group" ApplicationGroupLink="APP_OTHER"> <IdsSignature Id="00000000000000000011000400000001" Name="DoS Real Audio Server" Enable="1" Severity="10" Description="DoS Real Audio Server"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,dest=(7070),msg="E23001 DoS Real Audio Server",tcp_flag&ack,content="\xff\xf4\xff\xfd\x06"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000002" Name="DoS Real Server template.html" Enable="1" Severity="10" Description="DoS Real Server template.html"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,dest=(7070),msg="E23002 DoS Real Server template.html",tcp_flag&ack,content="/viewsource/template.html?"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000003" Name="DoS Real Server template.html" Enable="1" Severity="10" Description="DoS Real Server template.html"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,dest=(8080),msg="E23003 DoS Real Server template.html",tcp_flag&ack,content="/viewsource/template.html?"</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000005" Name=" DoS ath0" Enable="1" Severity="10" Description=" DoS ath0"> <IdsTrafficCondition>rule icmp,daddr=$LOCALHOST,msg="E23005 DoS ath0",content="+++ath0",type=8</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000006" Name="DoS Ascend Route" Enable="1" Severity="10" Description="DoS Ascend Route"> <IdsTrafficCondition>rule udp,daddr=$LOCALHOST,dest=(9),msg="E23006 DoS Ascend Route",content="\x4e\x41\x4d\x45\x4e\x41\x4d\x45"C(25,50)</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000007" Name="DoS arkiea backup" Enable="1" Severity="10" Description="DoS arkiea backup"> <IdsTrafficCondition>rule tcp,daddr=$LOCALHOST,dest=(617),tot_len>=1445,msg="E23007 DoS arkiea backup",tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000009" Name="DDOS tfn2k icmp possible communication" Enable="1" Severity="10" Description="DDOS tfn2k icmp possible communication"> <IdsTrafficCondition>rule icmp,daddr=$LOCALHOST,msg="E21001 DDOS tfn2k icmp possible communication",type=0,content="AAAAAAAAAA"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000000A" Name="DDOS Trin00:DaemontoMaster(PONGdetected)" Enable="1" Severity="10" Description="DDOS Trin00:DaemontoMaster(PONGdetected)"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,msg="E21002 DDOS Trin00:DaemontoMaster(PONGdetected)",content="PONG"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000000B" Name="DDOS Stacheldraht server-response-gag" Enable="1" Severity="10" Description="DDOS Stacheldraht server-response-gag"> <IdsTrafficCondition>rule icmp,saddr=$LOCALHOST,msg="E21004 DDOS Stacheldraht server-response-gag",content="\x73\x69\x63\x6B\x65\x6E"C,type=0</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000000C" Name="DDOS Stacheldraht server-response" Enable="1" Severity="10" Description="DDOS Stacheldraht server-response"> <IdsTrafficCondition>rule icmp,saddr=$LOCALHOST,msg="E21005 DDOS Stacheldraht server-response",content="\x66\x69\x63\x6B\x65\x6E"C,type=0</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000000D" Name="DDOS Stacheldraht client-spoofworks" Enable="1" Severity="10" Description="DDOS Stacheldraht client-spoofworks"> <IdsTrafficCondition>rule icmp,daddr=$LOCALHOST,msg="E21006 DDOS Stacheldraht client-spoofworks",type=0,content="\x73\x70\x6F\x6F\x66\x77\x6F\x72\x6B\x73"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000000F" Name="DDOS Stacheldraht client-check" Enable="1" Severity="10" Description="DDOS Stacheldraht client-check"> <IdsTrafficCondition>rule icmp,daddr=$LOCALHOST,msg="E21008 DDOS Stacheldraht client-check",content="\x73\x6B\x69\x6C\x6C\x7A"C,type=0</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000010" Name="DDOS shaft client to handler" Enable="1" Severity="10" Description="DDOS shaft client to handler"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(20432),msg="E21009 DDOS shaft client to handler",tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000011" Name="DDOS Trin00:DaemontoMaster(messagedetected)" Enable="1" Severity="10" Description="DDOS Trin00:DaemontoMaster(messagedetected)"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(31335),msg="E21010 DDOS Trin00:DaemontoMaster(messagedetected)",content="l44"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000012" Name="DDOS Trin00:DaemontoMaster(*HELLO*detected)" Enable="1" Severity="10" Description="DDOS Trin00:DaemontoMaster(*HELLO*detected)"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(31335),msg="E21011 DDOS Trin00:DaemontoMaster(*HELLO*detected)",content="*HELLO*"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000013" Name="DDOS Trin00:Attacker to Master default startup password" Enable="1" Severity="10" Description="DDOS Trin00:Attacker to Master default startup password"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(27665),msg="E21012 DDOS Trin00:Attacker to Master default startup password",tcp_flag&ack,content="betaalmostdone"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000014" Name="DDOS Trin00 Attacker to Master default password" Enable="1" Severity="10" Description="DDOS Trin00 Attacker to Master default password"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(27665),msg="E21013 DDOS Trin00 Attacker to Master default password",tcp_flag&ack,content="gOrave"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000015" Name="DDOS Trin00 Attacker to Master default mdie password" Enable="1" Severity="10" Description="DDOS Trin00 Attacker to Master default mdie password"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(27665),msg="E21014 DDOS Trin00 Attacker to Master default mdie password",tcp_flag&ack,content="killme"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000016" Name="DDOS Stacheldraht client-check-gag" Enable="1" Severity="10" Description="DDOS Stacheldraht client-check-gag"> <IdsTrafficCondition>rule icmp, daddr=$LOCALHOST,msg="E21015 DDOS Stacheldraht client-check-gag",content="\x67\x65\x73\x75\x6E\x64\x68\x65\x69\x74\x21",type=0</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000017" Name="DDOS Trin00:MastertoDaemon(defaultpassdetected!)" Enable="1" Severity="10" Description="DDOS Trin00:MastertoDaemon(defaultpassdetected!)"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(27444),msg="E21016 DDOS Trin00:MastertoDaemon(defaultpassdetected!)",content="l44adsl"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000018" Name="DDOS TFN server response" Enable="1" Severity="10" Description="DDOS TFN server response"> <IdsTrafficCondition>rule icmp, daddr=$LOCALHOST,msg="E21017 DDOS TFN server response",content="\x73\x68\x65\x6C\x6C\x20\x62\x6F\x75\x6E\x64\x20\x74\x6F\x20\x70\x6F\x72\x74",type=0</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000019" Name="DDOS shaft handler to agent" Enable="1" Severity="10" Description="DDOS shaft handler to agent"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(18753),msg="E21018 DDOS shaft handler to agent",content="alive tijgu"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001A" Name="DDOS shaft agent to handler" Enable="1" Severity="10" Description="DDOS shaft agent to handler"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(20433),msg="E21019 DDOS shaft agent to handler",content="alive"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001B" Name="DDOS shaft synflood outgoing" Enable="1" Severity="10" Description="DDOS shaft synflood outgoing"> <IdsTrafficCondition>rule tcp,saddr=$LOCALHOST,source=(1024),dest=(0),msg="E21020 DDOS shaft synflood outgoing",tcp_flag&syn</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001C" Name="DDOS shaft synflood incoming" Enable="1" Severity="10" Description="DDOS shaft synflood incoming"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(1024),dest=(0),msg="E21021 DDOS shaft synflood incoming",tcp_flag&syn</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001D" Name="DDOS mstream agent to handler" Enable="1" Severity="10" Description="DDOS mstream agent to handler"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(6838),msg="E21022 DDOS mstream agent to handler",content="newserver"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001E" Name="DDOS mstream handler to agent" Enable="1" Severity="10" Description="DDOS mstream handler to agent"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(10498),msg="E21023 DDOS mstream handler to agent",content="stream/"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100040000001F" Name="DDOS mstream handler ping to agent" Enable="1" Severity="10" Description="DDOS mstream handler ping to agent"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(10498),msg="E21024 DDOS mstream handler ping to agent",content="ping"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000020" Name="DDOS mstream agent pong to handler" Enable="1" Severity="10" Description="DDOS mstream agent pong to handler"> <IdsTrafficCondition>rule udp, daddr=$LOCALHOST,source=(0),dest=(10498),msg="E21025 DDOS mstream agent pong to handler",content="pong"C</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000021" Name="DDOS mstream client to handler" Enable="1" Severity="10" Description="DDOS mstream client to handler"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(12754),msg="E21026 DDOS mstream client to handler",content=">"C,tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000022" Name="DDOS mstream handler to client" Enable="1" Severity="10" Description="DDOS mstream handler to client"> <IdsTrafficCondition>rule tcp,saddr=$LOCALHOST,source=(12754),dest=(0),msg="E21027 DDOS mstream handler to client",content=">"C,tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000023" Name="DDOS mstream client to handler" Enable="1" Severity="10" Description="DDOS mstream client to handler"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST,source=(0),dest=(15104),msg="E21028 DDOS mstream client to handler",tcp_flag&syn</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000400000024" Name="DDOS mstream handler to client" Enable="1" Severity="10" Description="DDOS mstream handler to client"> <IdsTrafficCondition>rule tcp,saddr=$LOCALHOST,source=(15104),dest=(0),msg="E21029 DDOS mstream handler to client",content=">"C,tcp_flag&ack</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> </IdsSignatureGroup> <IdsSignatureGroup Id="00000000000000000011000700000000" Name="IDS-MSSQL" Enable="1" Severity="1" Description="Microsoft SQL Server IDS Signature" ApplicationGroupLink="APP_OTHER"> <IdsSignature Id="00000000000000000011000700000002" Name="MS-SQL - xp_displayparamstmt possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_displayparamstmt possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42001 MS-SQL - xp_displayparamstmt possible buffer overflow", content="x\x00p\x00_\x00d\x00i\x00s\x00p\x00l\x00a\x00y\x00p\x00a\x00r\x00a\x00m\x00s\x00t\x00m\x00t"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000003" Name="MS-SQL - xp_setsqlsecurity possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_setsqlsecurity possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42002 MS-SQL - xp_setsqlsecurity possible buffer overflow", content="x\x00p\x00_\x00s\x00e\x00t\x00s\x00q\x00l\x00s\x00e\x00c\x00u\x00r\x00i\x00t\x00y"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000009" Name="MS-SQL PIPES xp_cmdshell - program execution" Enable="1" Severity="10" Description="MS-SQL PIPES xp_cmdshell - program execution" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42008 MS-SQL PIPES xp_cmdshell - program execution", content="x\x00p\x00_\x00c\x00m\x00d\x00s\x00h\x00e\x00l\x00l\x00"(32,32), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000000A" Name="MS-SQL - xp_enumresultset possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_enumresultset possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42009 MS-SQL - xp_enumresultset possible buffer overflow", content="x\x00p\x00_\x00e\x00n\x00u\x00m\x00r\x00e\x00s\x00u\x00l\x00t\x00s\x00e\x00t"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000000E" Name="MS-SQL xp_reg* - registry access" Enable="1" Severity="10" Description="MS-SQL xp_reg* - registry access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42013 MS-SQL xp_reg* - registry access", content="x\x00p\x00_\x00r\x00e\x00g\x00"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000000F" Name="MS-SQL xp_cmdshell - program execution" Enable="1" Severity="10" Description="MS-SQL xp_cmdshell - program execution" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42014 MS-SQL xp_cmdshell - program execution", content="x\x00p\x00_\x00c\x00m\x00d\x00s\x00h\x00e\x00l\x00l\x00"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000011" Name="MS-SQL PIPES xp_reg* - registry access" Enable="1" Severity="10" Description="MS-SQL PIPES xp_reg* - registry access" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42016 MS-SQL PIPES xp_reg* - registry access", content="x\x00p\x00_\x00r\x00e\x00g\x00"(32,32), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000012" Name="MS-SQL - xp_printstatements possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_printstatements possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42017 MS-SQL - xp_printstatements possible buffer overflow", content="x\x00p\x00_\x00p\x00r\x00i\x00n\x00t\x00s\x00t\x00a\x00t\x00e\x00m\x00e\x00n\x00t\x00s"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000013" Name="MS-SQL Buffer overflow shellcode ACTIVE ATTACK" Enable="1" Severity="10" Description="MS-SQL Buffer overflow shellcode ACTIVE ATTACK" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139,1433), msg="D42018 MS-SQL Buffer overflow shellcode ACTIVE ATTACK", content="\x39\x20\xd0\x00\x92\x01\xc2\x00\x52\x00\x55\x00\x39\x20\xec\x00"C, tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000014" Name="MS-SQL Buffer overflow shellcode ACTIVE ATTACK" Enable="1" Severity="10" Description="MS-SQL Buffer overflow shellcode ACTIVE ATTACK" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139,1433), msg="D42019 MS-SQL Buffer overflow shellcode ACTIVE ATTACK", content="\x48\x00\x25\x00\x78\x00\x77\x00\x90\x00\x90\x00\x90\x00\x90\x00\x90\x00\x33\x00\xc0\x00\x50\x00\x68\x00\x2e\x00"C, tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000015" Name="MS-SQL - xp_sprintf possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_sprintf possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42020 MS-SQL - xp_sprintf possible buffer overflow", content="x\x00p\x00_\x00s\x00p\x00r\x00i\x00n\x00t\x00f"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000016" Name="MS-SQL - xp_showcolv possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_showcolv possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42021 MS-SQL - xp_showcolv possible buffer overflow", content="x\x00p\x00_\x00s\x00h\x00o\x00w\x00c\x00o\x00l\x00v"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000017" Name="MS-SQL - xp_peekqueue possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_peekqueue possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42022 MS-SQL - xp_peekqueue possible buffer overflow", content="x\x00p\x00_\x00p\x00e\x00e\x00k\x00q\x00u\x00e\x00u\x00e"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000018" Name="MS-SQL - xp_proxiedmetadata possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_proxiedmetadata possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42023 MS-SQL - xp_proxiedmetadata possible buffer overflow", content="x\x00p\x00_\x00p\x00r\x00o\x00x\x00i\x00e\x00d\x00m\x00e\x00t\x00a\x00d\x00a\x00t\x00a"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000019" Name="MS-SQL - xp_printstatements possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_printstatements possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42024 MS-SQL - xp_printstatements possible buffer overflow", content="x\x00p\x00_\x00p\x00r\x00i\x00n\x00t\x00s\x00t\x00a\x00t\x00e\x00m\x00e\x00n\x00t\x00s"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001A" Name="MS-SQL - xp_updatecolvbm possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_updatecolvbm possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42025 MS-SQL - xp_updatecolvbm possible buffer overflow", content="x\x00p\x00_\x00u\x00p\x00d\x00a\x00t\x00e\x00c\x00o\x00l\x00v\x00b\x00m"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001B" Name="MS-SQL - xp_updatecolvbm possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_updatecolvbm possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42026 MS-SQL - xp_updatecolvbm possible buffer overflow", content="x\x00p\x00_\x00u\x00p\x00d\x00a\x00t\x00e\x00c\x00o\x00l\x00v\x00b\x00m"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001C" Name="MS-SQL - xp_displayparamstmt possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_displayparamstmt possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42027 MS-SQL - xp_displayparamstmt possible buffer overflow", content="x\x00p\x00_\x00d\x00i\x00s\x00p\x00l\x00a\x00y\x00p\x00a\x00r\x00a\x00m\x00s\x00t\x00m\x00t"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001D" Name="MS-SQL - xp_setsqlsecurity possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_setsqlsecurity possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42028 MS-SQL - xp_setsqlsecurity possible buffer overflow", content="x\x00p\x00_\x00s\x00e\x00t\x00s\x00q\x00l\x00s\x00e\x00c\x00u\x00r\x00i\x00t\x00y"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001E" Name="MS-SQL - xp_sprintf possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_sprintf possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42029 MS-SQL - xp_sprintf possible buffer overflow", content="x\x00p\x00_\x00s\x00p\x00r\x00i\x00n\x00t\x00f"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="0000000000000000001100070000001F" Name="MS-SQL - xp_showcolv possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_showcolv possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42030 MS-SQL - xp_showcolv possible buffer overflow", content="x\x00p\x00_\x00s\x00h\x00o\x00w\x00c\x00o\x00l\x00v"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000020" Name="MS-SQL - xp_peekqueue possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_peekqueue possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42031 MS-SQL - xp_peekqueue possible buffer overflow", content="x\x00p\x00_\x00p\x00e\x00e\x00k\x00q\x00u\x00e\x00u\x00e"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000021" Name="MS-SQL - xp_proxiedmetadata possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_proxiedmetadata possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(1433), msg="D42032 MS-SQL - xp_proxiedmetadata possible buffer overflow", content="x\x00p\x00_\x00p\x00r\x00o\x00x\x00i\x00e\x00d\x00m\x00e\x00t\x00a\x00d\x00a\x00t\x00a"(8,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> <IdsSignature Id="00000000000000000011000700000022" Name="MS-SQL - xp_enumresultset possible buffer overflow" Enable="1" Severity="10" Description="MS-SQL - xp_enumresultset possible buffer overflow" HostType="PASSIVE"> <IdsTrafficCondition>rule tcp, daddr=$LOCALHOST, dest=(139), msg="D42034 MS-SQL - xp_enumresultset possible buffer overflow", content="x\x00p\x00_\x00e\x00n\x00u\x00m\x00r\x00e\x00s\x00u\x00l\x00t\x00s\x00e\x00t"(32,0), tcp_flag&ack|psh</IdsTrafficCondition> <Action LogEvent="0" PacketProcess="DROP"/> </IdsSignature> </IdsSignatureGroup> <IdsSignatureGroup Id="00000000000000000011000100000000" Name="Mics_group" Enable="1" Severity="1" Description="Mics_group" ApplicationGroupLink="APP_OTHER"> </IdsSignatureGroup> </IdsSignatureGroupZone> <ApplicationGroupZone> <ApplicationGroup Name="APP_OTHER" Description="App_Descript_1"> <Executable Enable="1">*</Executable> </ApplicationGroup> <ApplicationGroup Name="APP_IIS_WEB" Description="App_Descript_1"> <Executable Enable="1">inetinfo.exe</Executable> </ApplicationGroup> <ApplicationGroup Name="APP_SVCHOST" Description="App_Descript_1"> <Executable Enable="1">svchost.exe</Executable> </ApplicationGroup> </ApplicationGroupZone> <MacroZone> <Macro Name="any" Type="NONE" Enable="1" Content="(0.0.0.0/0)" Description="var any=(0.0.0.0/0)"/> </MacroZone> </IdsGlobal> </IdsSignatureLib>