'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:339604)

Rule General Information
Release Date: 2025-11-12
Rule Name: HackTool httpx Detection
Severity:
CVE ID:
Rule Protection Details
Description: httpx is an open-source, high-speed HTTP toolkit designed for asset discovery, service fingerprinting and vulnerability identification. While commonly used by security researchers, attackers frequently embed it in automated exploitation frameworks to perform large-scale reconnaissance against internal or public-facing web infrastructures. Its ability to issue concurrent, low-volume requests with customizable headers allows malicious actors to stealthily map live services, hidden directories, sensitive files and exploitable entry points without triggering traditional rate-based defenses. The intelligence gathered accelerates follow-on attacks such as SQL injection, credential brute-forcing or supply-chain compromise. Presence of this tool’s characteristic traffic inside a network typically signals unauthorized scanning activity, risking exposure of critical systems, leakage of vulnerability data and establishment of persistent footholds, mandating immediate investigation of the originating host and potential lateral movement.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference:
Solutions
Please contact the software vendor to update the software patch.