27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ealtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 4441 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is a server within a<br />

botnet network. A botnet is a network of compromised computers that are remotely<br />

controlled by a malicious bot administrator. Botnets are commonly used for\nsending<br />

spam\nrunning Denial of Service (DoS) attacks against other networks\nscanning and<br />

compromising new systems\ninstalling sniffers\ninstalling keyloggers\nidentify theft<br />

\n\nThe observed command being sent from the server was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 4442 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\ninstalling sniffers\ninstalling<br />

keyloggers\nidentify theft\nThe observed command was '%P'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

Orb Client Detection<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4443 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1159

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!