File: web-application.sig

package info (click to toggle)
prads 0.3.3-7
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 2,636 kB
  • sloc: ansic: 10,215; perl: 1,689; sql: 204; makefile: 152; sh: 144; python: 20
file content (23 lines) | stat: -rw-r--r-- 925 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
# This file will hold signatures that will be used to
# Identify webapplications hosted on an asset.
# This will be interesting for snort/suricata users,
# so they know what web-application rules they _should_
# have enabled!
# Example:
# If you know you have wordpress on your server, Enable Snort/ET/Suricata rules:
# msg:"BACKDOOR Wordpress backdoor theme.php code execution attempt";
# msg:"BACKDOOR Wordpress backdoor feed.php code execution attempt";
# msg:"WEB-PHP Wordpress cache_lastpostdate code injection attempt";
# msg:"WEB-PHP wordpress cat parameter arbitrary file execution attempt";
# that has wordpress as the secound name in the msg tag!

# WordPress
# <meta name="generator" content="WordPress 2.0.12-alpha" /> <!-- leave this for stats please -->

# Drupal
# <script type="text/javascript" src="/misc/drupal.js?t"></script>
# old
# <style type="text/css" media="all">@import "misc/drupal.css" .... />