Back Aperture signature alternation 9000 series

Back Aperture signature alternation 9000 series

Back aperture signatures are specific to acclaimed aback doors. These signatures blaze off of action that is targeting the accepted ports and protocols of the backdoor. Any alarms from these signatures should be advised closely. The ports can be acclimated in accurate applications.

9000-Back Aperture Probe (TCP 12345): This signature fires back a TCP SYN packet to anchorage 12345 which is a accepted trojan anchorage for NetBus as able-bodied as the following: Adore sshd, Ashley, cron / crontab, Fat Bitch trojan, GabanBus, icmp_client.c, icmp_pipe.c, Mypic, NetBus Toy, Pie Bill Gates, ValvNet, Whack Job, X-bill.

9001-Back Aperture Probe (TCP 31337): This signature fires back a TCP SYN packet to anchorage 31337 which is a accepted trojan anchorage for BackFire, Aback Orifice, DeepBO, ADM worm, Baron Night, Beeone, bindshell, BO client, BO Facil, BO spy, BO2, cron / crontab, Freak88, Freak2k, Gummo, Linux Rootkit, Sm4ck, Sockdmini.

9002-Back Aperture Probe (TCP 1524): This signature fires back a TCP SYN packet to anchorage 1524 which is a accepted backdoor placed on machines by worms and hackers.

9003-Back Aperture Probe (TCP 2773): This signature fires back a TCP SYN packet to anchorage 2773 which is a accepted trojan anchorage for SubSeven.

9004-Back Aperture Probe (TCP 2774): This signature fires back a TCP SYN packet to anchorage 2774 which is a accepted trojan anchorage for SubSeven.

9005-Back Aperture Probe (TCP 20034): This signature fires back a TCP SYN packet to anchorage 20034 which is a accepted trojan anchorage for Netbus Pro as able-bodied as NetRex and Whack Job.

9006-Back Aperture Probe (TCP 27374): This signature fires back a TCP SYN packet to anchorage 27374 which is a accepted trojan anchorage for SubSeven as able-bodied as Bad Blood, EGO, Fake SubSeven, Lion, Ramen, Seeker, The Saint, Ttfloader and Webhead.

9007-Back Aperture Probe (TCP 1234): This signature fires back a TCP SYN packet to anchorage 1234 which is a accepted trojan anchorage for SubSeven is detected.

9008-Back Aperture Probe (TCP 1999): This signature fires back a TCP SYN packet to anchorage 1999 which is a accepted trojan anchorage for SubSeven.

9009-Back Aperture Probe (TCP 6711): This signature fires back a TCP SYN packet to anchorage 6711 which is a accepted trojan anchorage for SubSeven.

9010-Back Aperture Probe (TCP 6712): This signature fires back a TCP SYN packet to anchorage 6712 which is a accepted trojan anchorage for SubSeven.

9011-Back Aperture Probe (TCP 6713): This signature fires back a TCP SYN packet to anchorage 6713 which is a accepted trojan anchorage for SubSeven.

9012-Back Aperture Probe (TCP 6776): This signature fires back a TCP SYN packet to anchorage 6776 which is a accepted trojan anchorage for SubSeven.

9013-Back Aperture Probe (TCP 16959): This signature fires back a TCP SYN packet to anchorage 16959 which is a accepted trojan anchorage for SubSeven.

9014-Back Aperture Probe (TCP 27573): This signature fires back a TCP SYN packet to anchorage 27573 which is a accepted trojan anchorage for SubSeven.

9015-Back Aperture Probe (TCP 23432): This signature fires back a TCP SYN packet to anchorage 23432 which is a accepted trojan anchorage for asylum.

9016-Back Aperture Probe (TCP 5400): This signature fires back a TCP SYN packet to anchorage 5400 which is a accepted trojan anchorage for back-construction.

9017-Back Aperture Probe (TCP 5401): This signature fires back a TCP SYN packet to anchorage 5401 which is a accepted trojan anchorage for back-construction.

9018-Back Aperture Probe (TCP 2115): This signature fires back a TCP SYN packet to anchorage 2115 which is a accepted trojan anchorage for bugs.

9019-Back Aperture (UDP 2140): This signature fires back a UDP packet to anchorage 2140 which is a accepted trojan anchorage for deep-throat.

9020-Back Aperture (UDP 47262): This signature fires back a UDP packet to anchorage 47262 which is a accepted trojan anchorage for delta-source.

9021-Back Aperture (UDP 2001): This signature fires back a UDP packet to anchorage 2001 which is a accepted trojan anchorage for the Apache/chunked-encoding worm.

9022-Back Aperture (UDP 2002): This signature fires back a UDP packet to anchorage 2002 which is a accepted trojan anchorage for the Apache/mod_ssl worm.

9023-Back Aperture Probe (TCP 36794): This signature fires back a TCP SYN packet to anchorage 36794 which is a accepted trojan anchorage for NetBus as able-bodied as the following: Bugbear

9024-Back Aperture Probe (TCP 10168): This signature fires back a TCP SYN packet to anchorage 10168 which is a accepted trojan anchorage for lovegate.

9025-Back Aperture Probe (TCP 20168): This signature fires back a TCP SYN packet to anchorage 20168 which is a accepted trojan anchorage for lovegate.

9026-Back Aperture Probe (TCP 1092): This signature fires back a TCP SYN packet to anchorage 1092 which is a accepted trojan anchorage for lovegate.

9027-Back Aperture Probe (TCP 2018): This signature fires back a TCP SYN packet to anchorage 2018 which is a accepted trojan anchorage for fizzer.

9028-Back Aperture Probe (TCP 2019): This signature fires back a TCP SYN packet to anchorage 2019 which is a accepted trojan anchorage for fizzer.

9029-Back Aperture Probe (TCP 2020): This signature fires back a TCP SYN packet to anchorage 2020 which is a accepted trojan anchorage for fizzer.

9030-Back Aperture Probe (TCP 2021): This signature fires back a TCP SYN packet to anchorage 2021 which is a accepted trojan anchorage for fizzer.

9200-Back Aperture Response (TCP 12345): This signature fires back a TCP SYN/ACK packet from anchorage 12345 which is a accepted trojan anchorage for NetBus as able-bodied as the following: Adore sshd, Ashley, cron / crontab, Fat Bitch trojan, GabanBus, icmp_client.c, icmp_pipe.c, Mypic, NetBus Toy, Pie Bill Gates, ValvNet, Whack Job, X-bill.

9201-Back Aperture Response (TCP 31337): This signature fires back a TCP SYN/ACK packet from anchorage 31337 which is a accepted trojan anchorage for BackFire, Aback Orifice, DeepBO, ADM worm, Baron Night, Beeone, bindshell, BO client, BO Facil, BO spy, BO2, cron / crontab, Freak88, Freak2k, Gummo, Linux Rootkit, Sm4ck, Sockdmini.

9202-Back Aperture Response (TCP 1524): This signature fires back a TCP SYN/ACK packet from anchorage 1524 which is a accepted backdoor placed on machines by worms and hackers.

9203-Back Aperture Response (TCP 2773): This signature fires back a TCP SYN/ACK packet from anchorage 2773 which is a accepted trojan anchorage for SubSeven.

9204-Back Aperture Response (TCP 2774): This signature fires back a TCP SYN/ACK packet from anchorage 2774 which is a accepted trojan anchorage for SubSeven.

9205-Back Aperture Response (TCP 20034): This signature fires back a TCP SYN/ACK packet from anchorage 20034 which is a accepted trojan anchorage for Netbus Pro as able-bodied as NetRex and Whack Job.

9206-Back Aperture Response (TCP 27374): This signature fires back a TCP SYN/ACK packet from anchorage 27374 which is a accepted trojan anchorage for SubSeven as able-bodied as Bad Blood, EGO, Fake SubSeven, Lion, Ramen, Seeker, The Saint, Ttfloader and Webhead.

9207-Back Aperture Response (TCP 1234): This signature fires back a TCP SYN/ACK packet from anchorage 1234 which is a accepted trojan anchorage for SubSeven.

9208-Back Aperture Response (TCP 1999): This signature fires back a TCP SYN/ACK packet from anchorage 1999 which is a accepted trojan anchorage for SubSeven.

9209-Back Aperture Response (TCP 6711): This signature fires back a TCP SYN/ACK packet from anchorage 6711 which is a accepted trojan anchorage for SubSeven.

9210-Back Aperture Response (TCP 6712): This signature fires back a TCP SYN/ACK packet from anchorage 6712 which is a accepted trojan anchorage for SubSeven.

9211-Back Aperture Response (TCP 6713): This signature fires back a TCP SYN/ACK packet from anchorage 6713 which is a accepted trojan anchorage for SubSeven.

9212-Back Aperture Response (TCP 6776): This signature fires back a TCP SYN/ACK packet from anchorage 6776 which is a accepted trojan anchorage for SubSeven.

9213-Back Aperture Response (TCP 16959): This signature fires back a TCP SYN/ACK packet from anchorage 16959 which is a accepted trojan anchorage for SubSeven.

9214-Back Aperture Response (TCP 27573): This signature fires back a TCP SYN/ACK packet from anchorage 27573 which is a accepted trojan anchorage for SubSeven.

9215-Back Aperture Response (TCP 23432): This signature fires back a TCP SYN/ACK packet from anchorage 23432 which is a accepted trojan anchorage for asylum.

9216-Back Aperture Response (TCP 5400): This signature fires back a TCP SYN/ACK packet from anchorage 5400 which is a accepted trojan anchorage for back-construction.

9217-Back Aperture Response (TCP 5401): This signature fires back a TCP SYN/ACK packet from anchorage 5401 which is a accepted trojan anchorage for back-construction.

9218-Back Aperture Response (TCP 2115): This signature fires back a TCP SYN/ACK packet from anchorage 2115 which is a accepted trojan anchorage for bugs.

9223-Back Aperture Response (TCP 36794): This signature fires back a TCP SYN/ACK packet from anchorage 36794 which is a accepted trojan anchorage for NetBus as able-bodied as the following: Bugbear

9224-Back Aperture Response (TCP 10168): This signature fires back a TCP SYN/ACK packet from anchorage 10168 which is a accepted trojan anchorage for lovegate.

9225-Back Aperture Response (TCP 20168): This signature fires back a TCP SYN/ACK packet from anchorage 20168 which is a accepted trojan anchorage for lovegate.

9226-Back Aperture Response (TCP 1092): This signature fires back a TCP SYN/ACK packet from anchorage 1092 which is a accepted trojan anchorage for lovegate.

9227-Back Aperture Response (TCP 2018): This signature fires back a TCP SYN/ACK packet from anchorage 2018 which is a accepted trojan anchorage for fizzer.

9228-Back Aperture Response (TCP 2019): This signature fires back a TCP SYN/ACK packet from anchorage 2019 which is a accepted trojan anchorage for fizzer.

9229-Back Aperture Response (TCP 2020): This signature fires back a TCP SYN/ACK packet from anchorage 2020 which is a accepted trojan anchorage for fizzer.

9230-Back Aperture Response (TCP 2021): This signature fires back a TCP SYN/ACK packet from anchorage 2021 which is a accepted trojan anchorage for fizzer.