27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3142 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 3143 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\nInstalling sniffers\nInstalling keyloggers\nIdentify theft\nThe observed command<br />

was '%L'\n<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3144 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Family Internet Services 805

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!