[Snort-sigs] SID 111
JohnLiss at ...1619...
Thu Jun 19 09:18:24 EDT 2003
# This is a template for submitting snort signature descriptions to
# the snort.org website
# Ensure that your descriptions are your own
# and not the work of others. References in the rules themselves
# should be used for linking to other's work.
# If you are unsure of some part of a rule, use that as a commentary
# and someone else perhaps will be able to fix it.
Rule: BACKDOOR netbus getinfo SID 111
This event is generated when an attacker is connected and issues the command 'getinfo'
Possible theft of data and control of the targeted machine leading to a compromise of all resources the machine is connected to.
The program is a backdoor designed for Windows. It allows anyone who knows the listening port number and password to
remotely control the host. Intruders access the server using either a text or graphics based client.
The backdoor program allows the remote user to execute commands, list files, start silent services, share directories, upload and download files, manipulate the registry, kill processes, list processes, as well as other options, as well as open/close the CD-ROM drive, send interactive dialogs to chat with the compromised system, listen to the system's microphone (if it has one), and a few other features.
This Trojan may be delivered to the target in a number of ways. This event is indicative of an existing infection being activated. Initial compromise may be due to the exploitation of another vulnerability and the attacker is leaving another way into the machine for further use.
Ease of Attack:
This is Trojan activity, the target machine may already be compromised.
Security tool probing for netbus
Disallow Telnet access to port 12345 from external sources.
Use SSH as opposed to Telnet for access from external locations
Delete the Trojan and kill any associated processes.
Original rule writer unknown
More information about the Snort-sigs