27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The results of an 'fscan' (now called Scanline) session were observed in a TCP session<br />

normally used for a standard service. This may indicate a successful compromise of this<br />

service has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Windows 'net use' Command<br />

<strong>PVS</strong> ID: 6201 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: A successful 'net use' command occurred in a TCP session normally used for a standard<br />

service.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show privilege' Command<br />

<strong>PVS</strong> ID: 6202 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Solution: The command activity observed is indicative of a possible compromise. Consider<br />

performing a full audit of the system to investigate further.<br />

CVE Not available<br />

Successful Shell Attack Detected - Cisco 'show version' Command<br />

<strong>PVS</strong> ID: 6203 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a Cisco IOS command occurred in a TCP session normally used for a<br />

standard service. This may indicate that a successful compromise of the router or switch<br />

has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1693

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!