TROJAN: Remote Explorer Connection
This signature detects Remote Explorer traffic on common ports. Attackers can use Remote Explorer to control a Windows host using methods similar to VNC.
Extended Description
Remote Explorer is designed to allow an administrator to monitor all server activities in real time and perform remote administration. If abused, it could become a hacking tool.
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
8.8