시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,0112015/01/20 2009256  ET SHELLCODE Berlin Shellcode; [1
7,0102015/01/20 2009255  ET SHELLCODE Mannheim Shellcode; [1
7,0092015/01/20 2009254  ET SHELLCODE Lichtenfels Shellcode; [1
7,0082015/01/20 2009253  ET SHELLCODE Koeln Shellcode; [1
7,0072015/01/20 2009252  ET SHELLCODE Schauenburg Shellcode; [1
7,0062015/01/20 2009251  ET SHELLCODE Wuerzburg Shellcode; [1
7,0052015/01/20 2009250  ET SHELLCODE Mainz/Bielefeld Shellcode; [1
7,0042015/01/20 2009249  ET SHELLCODE Adenau Shellcode; [1
7,0032015/01/20 2009248  ET SHELLCODE Lindau (linkbot) xor Decoder Shellcode; [1
7,0022015/01/20 2009247  ET SHELLCODE Rothenburg Shellcode; [1
7,0012015/01/20 2009246  ET SHELLCODE Bindshell2 Decoder Shellcode; [1
7,0002015/01/20 2009245  ET ATTACK_RESPONSE Cisco TclShell TFTP Download; [1,2
6,9992015/01/20 2009244  ET ATTACK_RESPONSE Cisco TclShell TFTP Read Request; [1,2
6,9982015/01/20 2009243  ET POLICY HSRP Active Router Changed; [1,2
6,9972015/01/20 2009242  ET TROJAN LDPinch Reporting infection via Email; [1
6,9962015/01/20 2009241  ET TROJAN General Win32 Backdoor Checkin POST; [1
6,9952015/01/20 2009240  ET TROJAN General Win32 Backdoor Checkin POST Packet 1; [1
6,9942015/01/20 2009239  ET TROJAN PcClient Backdoor Checkin; [1
6,9932015/01/20 2009238  ET TROJAN PcClient Backdoor Checkin Packet 1; [1
6,9922015/01/20 2009236  ET MALWARE Pigeon.AYX/AVKill Related User-Agent (CTTBasic); [1
6,9912015/01/20 2009235  ET TROJAN PWSteal.Bancos Generic Banker Trojan SCR Download; [1,2,3
6,9902015/01/20 2009234  ET MALWARE Adware-Mirar Reporting (BAR); [1
6,9892015/01/20 2009233  ET WEB_SPECIFIC_APPS Hedgehog CMS header.php c_temp_path Remote File Inclusion; [1,2,3
6,9882015/01/20 2009232  ET WEB_SPECIFIC_APPS Hedgehog CMS footer.php c_temp_path Remote File Inclusion; [1,2,3
6,9872015/01/20 2009231  ET WEB_SPECIFIC_APPS Hedgehog CMS header.php c_temp_path Local File Inclusion; [1,2,3
6,9862015/01/20 2009230  ET WEB_SPECIFIC_APPS TECHNOTE shop_this_skin_path Paramter Local File Inclusion; [1,2,3
6,9852015/01/20 2009229  ET WEB_SPECIFIC_APPS TECHNOTE shop_this_skin_path Paramter Remote File Inclusion; [1,2,3
6,9842015/01/20 2009228  ET WEB_SPECIFIC_APPS AlstraSoft Video Share Enterprise album.php UID Parameter SQL Injection; [1,2,3
6,9832015/01/20 2009227  ET WEB_SPECIFIC_APPS eFiction toplists.php list Parameter SQL Injection; [1,2,3
6,9822015/01/20 2009226  ET ACTIVEX Sopcast SopCore ActiveX Control Remote Code Execution; [1,2
6,9812015/01/20 2009225  ET WEB_SPECIFIC_APPS ea-gBook index_inc.php inc_ordner parameter remote file inclusion; [1,2,3
6,9802015/01/20 2009224  ET WEB_SPECIFIC_APPS ea-gBook index_inc.php inc_ordner parameter local file inclusion; [1,2,3
6,9792015/01/20 2009223  ET TROJAN Fake AV Downloader.Onestage/FakeAlert.ZR User-Agent (AV1);  
6,9782015/01/20 2009222  ET MALWARE NewWeb User-Agent (Lobo Lunar); [1
6,9772015/01/20 2009220  ET SCAN Tomcat upload from external source; [1,2
6,9762015/01/20 2009219  ET DELETED Tomcat Successful default credential login from external source; [1
6,9752015/01/20 2009218  ET SCAN Tomcat admin-blank login credentials; [1,2
6,9742015/01/20 2009217  ET SCAN Tomcat admin-admin login credentials; [1,2
6,9732015/01/20 2009216  ET DELETED Oracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit; [1,2
6,9722015/01/20 2009215  ET TROJAN Farfli HTTP Checkin Activity; [1,2
6,9712015/01/20 2009213  ET TROJAN Zbot/Zeus Dropper Infection - /loads.php; [1
6,9702015/01/20 2009212  ET TROJAN Zbot/Zeus Dropper Infection - /check; [1
6,9692015/01/20 2009211  ET ATTACK_RESPONSE Unusual FTP Server Banner (NzmxFtpd); [1
6,9682015/01/20 2009210  ET ATTACK_RESPONSE Unusual FTP Server Banner (fuckFtpd); [1
6,9672015/01/20 2009209  ET TROJAN Rogue A/V Win32/FakeXPA GET Request; [1
6,9662015/01/20 2009208  ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 16); [1,2
6,9652015/01/20 2009207  ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 5); [1,2
6,9642015/01/20 2009206  ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 4); [1,2
6,9632015/01/20 2009205  ET TROJAN Possible Downadup/Conficker-C P2P encrypted traffic UDP Ping Packet (bit value 1); [1,2
6,9622015/01/20 2009204  ET TROJAN Crypt.CFI.Gen Checkin; [1
< 401  402  403  404  405  406  407  408  409  410 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.