home *** CD-ROM | disk | FTP | other *** search
- # backdoors (Back Orifice, etc) go here
-
- # submitted by Nick Rogness and Jim Forster
-
- # Backdoor Default Ports (not useful on networks with outgoing traffic)
- alert udp any any -> 192.168.1.0/24 31 (msg:"Hackers Paradise";)
- alert udp any any -> 192.168.1.0/24 456 (msg:"Hackers Paradise";)
- alert udp any any -> 192.168.1.0/24 555 (msg:"iNi Killer/Phase Zero/Stealth Spy";)
- alert udp any any -> 192.168.1.0/24 666 (msg:"Satanz Backdoor";)
- alert udp any any -> 192.168.1.0/24 1001 (msg:"Silencer, WebEX";)
- alert udp any any -> 192.168.1.0/24 1170 (msg:"Psyber Stream";)
- alert udp any any -> 192.168.1.0/24 1234 (msg:"Ultors Trojan";)
- alert udp any any -> 192.168.1.0/24 1245 (msg:"VooDoo Doll";)
- alert udp any any -> 192.168.1.0/24 1492 (msg:"FTP99cmp";)
- alert udp any any -> 192.168.1.0/24 1600 (msg:"Shivka-Burka";)
- alert udp any any -> 192.168.1.0/24 1807 (msg:"Spy Sender";)
- alert udp any any -> 192.168.1.0/24 1981 (msg:"ShockRave";)
- alert udp any any -> 192.168.1.0/24 1999 (msg:"Back Door";)
- alert udp any any -> 192.168.1.0/24 2001 (msg:"Trojan Cow";)
- alert udp any any -> 192.168.1.0/24 2023 (msg:"Ripper Pro";)
- alert udp any any -> 192.168.1.0/24 2115 (msg:"Bugs";)
- alert udp any any -> 192.168.1.0/24 2140 (msg:"Deep Throat/Invasor";)
- alert udp any any -> 192.168.1.0/24 2565 (msg:"Striker";)
- alert udp any any -> 192.168.1.0/24 2801 (msg:"Phineas Phucker";)
- alert udp any any -> 192.168.1.0/24 2989 (msg:"Rat backdoor";)
- alert udp any any -> 192.168.1.0/24 3024 (msg:"WinCrash";)
- alert udp any any -> 192.168.1.0/24 3150 (msg:"Deep Throat/Invasor";)
- alert udp any any -> 192.168.1.0/24 3700 (msg:"Portal Of Doom";)
- alert udp any any -> 192.168.1.0/24 4092 (msg:"WinCrash";)
- alert udp any any -> 192.168.1.0/24 4950 (msg:"ICQ Trojan";)
- alert udp any any -> 192.168.1.0/24 5000 (msg:"Sockets De Troie";)
- alert udp any any -> 192.168.1.0/24 5001 (msg:"Sockets De Troie";)
- alert udp any any -> 192.168.1.0/24 5321 (msg:"FireHotcker";)
- alert udp any any -> 192.168.1.0/24 5400 (msg:"Blade Runner";)
- alert udp any any -> 192.168.1.0/24 5401 (msg:"Blade Runner";)
- alert udp any any -> 192.168.1.0/24 5402 (msg:"Blade Runner";)
- alert udp any any -> 192.168.1.0/24 5569 (msg:"Robo-Hack";)
- alert udp any any -> 192.168.1.0/24 5742 (msg:"WinCrash";)
- alert udp any any -> 192.168.1.0/24 6670 (msg:"Deep Throat";)
- alert udp any any -> 192.168.1.0/24 6711 (msg:"Deep Throat/SubSeven";)
- alert udp any any -> 192.168.1.0/24 7000 (msg:"Remote Grab";)
- alert udp any any -> 192.168.1.0/24 7300 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7301 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7302 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7303 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7304 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7305 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7306 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7307 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7308 (msg:"Net Monitor";)
- alert udp any any -> 192.168.1.0/24 7789 (msg:"ICKiller";)
- alert udp any any -> 192.168.1.0/24 9872 (msg:"Portal Of Doom";)
- alert udp any any -> 192.168.1.0/24 10067 (msg:"Portal Of Doom";)
- alert tcp any any -> 192.168.1.0/24 10752 (msg:"Linux mountd backdoor";)
- alert udp any any -> 192.168.1.0/24 11223 (msg:"Progenic Trojan";)
- alert udp any any -> 192.168.1.0/24 12223 (msg:"Hack99-Keylogger";)
- alert tcp any any -> 192.168.1.0/24 12345 (msg:"Netbus/GabanBus";)
- alert tcp any any -> 192.168.1.0/24 12346 (msg:"Netbus/GabanBus";)
- alert tcp any any -> 192.168.1.0/24 12361 (msg:"Whack-a-mole";)
- alert tcp any any -> 192.168.1.0/24 12362 (msg:"Whack-a-mole";)
- alert udp any any -> 192.168.1.0/24 16969 (msg:"Portal Of Doom/Priority";)
- alert udp any any -> 192.168.1.0/24 20000 (msg:"Millenium";)
- alert udp any any -> 192.168.1.0/24 20001 (msg:"Millenium";)
- alert udp any any -> 192.168.1.0/24 20034 (msg:"NetBus PRO";)
- alert udp any any -> 192.168.1.0/24 21544 (msg:"Girlfriend";)
- alert udp any any -> 192.168.1.0/24 22222 (msg:"Prosiak";)
- alert udp any any -> 192.168.1.0/24 26274 (msg:"Delta";)
- alert udp any any -> 192.168.1.0/24 31337 (msg:"Back Orifice";)
- alert udp any any -> 192.168.1.0/24 31338 (msg:"Deep Back Orifice";)
- alert udp any any -> 192.168.1.0/24 31339 (msg:"NetSpy";)
- alert udp any any -> 192.168.1.0/24 31666 (msg:"BOWhack";)
- alert udp any any -> 192.168.1.0/24 33333 (msg:"Prosiak";)
- alert udp any any -> 192.168.1.0/24 34324 (msg:"Big Gluck/TelnetSrv";)
- alert udp any any -> 192.168.1.0/24 40412 (msg:"The Spy";)
- alert udp any any -> 192.168.1.0/24 40421 (msg:"Masters Paradise";)
- alert udp any any -> 192.168.1.0/24 40422 (msg:"Masters Paradise";)
- alert udp any any -> 192.168.1.0/24 40423 (msg:"Masters Paradise";)
- alert udp any any -> 192.168.1.0/24 40426 (msg:"Masters Paradise";)
- alert udp any any -> 192.168.1.0/24 47262 (msg:"Delta";)
- alert udp any any -> 192.168.1.0/24 50505 (msg:"Sockets de Troie";)
- alert udp any any -> 192.168.1.0/24 50776 (msg:"Fore";)
- alert udp any any -> 192.168.1.0/24 53001 (msg:"Remote Win Shutdown";)
- alert udp any any -> 192.168.1.0/24 61446 (msg:"TeleCommando";)
- alert udp any any -> 192.168.1.0/24 65000 (msg:"Devil";)
- alert tcp any any -> 192.168.1.0/24 31337 (msg:"BIND Shell";)
- alert udp any any -> 192.168.1.0/24 5632 (msg:"PCAnywhere"; content:"ST";)
- alert udp any any -> 192.168.1.0/24 22 (msg:"PCAnywhere"; content:"ST";)
- alert udp any any -> 192.168.1.0/24 22 (msg:"PCAnywhere"; content:"NQ";)
-
- # New backdoors from Martin Markgraf
-
- alert udp 192.168.1.0/24 2140 -> any any (content:"hhh My Mouth Is Open"; msg:"Deep Throat access";)
- alert udp any any -> 192.168.1.0/24 10067 (msg:"Possible Portal of Doom access";)
- alert udp any any -> 192.168.1.0/24 10167 (msg:"Possible Portal of Doom access";)
- alert udp 192.168.1.0/24 10167 -> any any (content:"KeepAliveee"; msg:"Portal of Doom access";)
- alert udp any any -> 192.168.1.0/24 31789 (msg:"Possible Hack a Tack access";)
- alert udp any any -> 192.168.1.0/24 31791 (msg:"Possible Hack a Tack access";)
- alert tcp any any -> 192.168.1.0/24 31785 (msg:"Possible Hack a Tack access";)
- alert tcp any any -> 192.168.1.0/24 30100 (msg:"Possible NetSphere access";)
- alert tcp 192.168.1.0/24 30100 -> any any (content:"<NetSphere"; msg:"NetSphere access"; flags: PA;)
- alert tcp any any -> 192.168.1.0/24 30102 (msg:"Possible NetSphere FTP acces";)
- alert tcp 192.168.1.0/24 30102 -> any any (content:"NetSphere Capture FTP"; msg:"NetSphere FTP acces"; flags: PA;)
- alert tcp any any -> 192.168.1.0/24 6969 (msg:"Possible GateCrasher access";)
- alert tcp 192.168.1.0/24 6969 -> any any (content:"GateCrasher"; msg:"GateCrasher access"; flags: PA;)
- alert tcp any any -> 192.168.1.0/24 21554 (msg:"Possible GirlFriend access";)
- alert tcp 192.168.1.0/24 21554 -> any any (content:"GirlFriend Server"; msg:"GirlFriend access"; flags: PA;)
- alert tcp any any -> 192.168.1.0/24 23456 (msg:"Possible EvilFTP access";)
- alert tcp 192.168.1.0/24 23456 -> any any (content:"EvilFTP"; msg:"EvilFTP access"; flags: PA;)
- alert tcp any any -> 192.168.1.0/24 1243 (msg:"Possible SubSeven access";)
- alert tcp any any -> 192.168.1.0/24 6776 (msg:"Possible SubSeven access";)
-
- # you can uncomment this rule if you like, but every TCP packet
- # with the PUSH and ACK flags set will have to do a
- # payload pattern match, which is bad for performance!
- #alert tcp any any -> any any (content:"phAse Zero server"; msg:"Possible phAse Zero access"; flags: PA;)
- #alert tcp any any -> any any (content:"connected. time/date" msg:"Possible SubSeven access"; flags: PA;)
-
-