SSH: UNIX Post-Exploit Commands
This signature detects common commands sent in the clear (unencrypted). Attackers often use these commands to verify that they have successfully exploited an SSH vulnerability.
Extended Description
An attacker could send commands to gage the level of access granted and then begin using the compromised system.
References
URL: http://www.ietf.org/html.charters/OLD/secsh-charter.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3