Bind Shell Backdoor Detection

Critical Nessus Plugin ID 51988


The remote host may have been compromised.


A shell is listening on the remote port without any authentication being required. An attacker may use it by connecting to the remote port and sending commands directly.


Verify if the remote host has been compromised, and reinstall the system if necessary.

Plugin Details

Severity: Critical

ID: 51988

File Name: wild_shell_backdoor.nasl

Version: 1.8

Type: remote

Family: Backdoors

Published: 2011/02/15

Modified: 2018/05/16

Dependencies: 11153

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H