Given the following extract from the snort log on a honeypot, what service is being exploited?
Given the following extract from the snort log on a honeypot, what do you infer from the attack?