SSL: UNIX id Response
This signature detects the output of the "id" command. Attackers often use the id command after a successful attack to determine which users they have access to. Typically, when this command is present in an HTTPS session, a successful attack has already occurred.
Extended Description
Presence of the output of the id command in an HTTPS stream could represent that an intrusion has occurred.
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3