SSH: UNIX Post-Exploit Commands

This signature detects common commands sent in the clear (unencrypted). Attackers often use these commands to verify that they have successfully exploited an SSH vulnerability.

Extended Description

An attacker could send commands to gage the level of access granted and then begin using the compromised system.

Short Name
SSH:MISC:EXPLOIT-CMDS-UNIX
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SSH
Keywords
Commands Post-Exploit UNIX
Release Date
10/16/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?