icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Generic Shell Detectors (Checkpoint Telnet)

Info

Synopsis

A shell server was noted on the host.

Description

A shell server was noted on the host. Typically, shells are used by remote users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In addition, many shells are used by malicious individuals as part of a Trojan program or remote buffer overflow exploit.

Solution

Ensure that the remote shell is secured against data leakage and that it is a valid and approved means of managing the remote machine.