[Silicon Defense logo]

SnortSnarf signature page

SERVER-WEBAPP Linksys E-series HNAP TheMoon remote code execution attempt

SnortSnarf v021111.1

Signature section (694)Top 20 source IPsTop 20 dest IPs

1 alerts with this signature using input module SnortFileInput, with sources:

Earliest such alert at 12:22:18.772605 on 10/21/2020
Latest such alert at 12:22:18.772605 on 10/21/2020

SERVER-WEBAPP Linksys E-series HNAP TheMoon remote code execution attempt 1 sources 1 destinations
Priority: 1Classification: Attempted Administrator Privilege Gain
[url:isc.sans.edu/diary/Linksys+Worm+%28%22TheMoon%22%29+Captured/17630] [sid:29831]

Sources triggering this attack signature

Source# Alerts (sig)# Alerts (total)# Dsts (sig)# Dsts (total)
209.141.43.351111

Destinations receiving this attack signature

Destinations# Alerts (sig)# Alerts (total)# Srcs (sig)# Srcs (total)
192.168.0.3816901380

SnortSnarf brought to you courtesy of Silicon Defense
Authors: Jim Hoagland and Stuart Staniford
See also the Snort Page by Marty Roesch
Page generated at Tue Nov 24 21:01:02 2020