SSL: UNIX Post-Exploit Commands
This signature detects common commands sent in the clear (unencrypted). Attackers often use these commands to verify that they have successfully exploited an HTTPS vulnerability.
Extended Description
Presence of the clear text output of certain UNIX commands in SSL/TLS could represent that an intrusion has occurred.
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3