27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 6138 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: An 'ifconfig' command occurred in a TCP session normally used for a standard service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'ls -a' Command<br />

<strong>PVS</strong> ID: 6139 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ls -a' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Unix 'ls -l' Command<br />

<strong>PVS</strong> ID: 6140 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'ls -l' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Linux Failed 'ls' Command<br />

<strong>PVS</strong> ID: 6141 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a failed 'ls' command occurred in a TCP session normally used for a standard<br />

service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

Family Internet Services 1676

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!