시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,9612015/01/20 2014770  ET WEB_SPECIFIC_APPS WordPress Download Monitor plugin uploader.php Cross-Site Scripting Attempt; [1
11,9602015/01/20 2014769  ET WEB_SPECIFIC_APPS WordPress CataBlog plugin category Cross-Site Scripting Attempt; [1
11,9592015/01/20 2014768  ET WEB_SPECIFIC_APPS WordPress WP Survey and Quiz Tool plugin rowcount Cross-Site Scripting Attempt; [1
11,9582015/01/20 2014767  ET MALWARE Win32.Bublik.B/Birele/Variant.Kazy.66443 Checkin;  
11,9572015/01/20 2014766  ET ACTIVEX Possible Windows Live Writer ActiveX BlogThisLink Method Access Denail of Service Attack 2; [1
11,9562015/01/20 2014765  ET ACTIVEX Possible Windows Live Writer ActiveX BlogThisLink Method Access Denail of Service Attack; [1
11,9552015/01/20 2014764  ET ACTIVEX Possible Chilkat Software FTP2 ActiveX Component GetFile Access Remote Code Execution 2; [1
11,9542015/01/20 2014763  ET ACTIVEX Possible Chilkat Software FTP2 ActiveX Component GetFile Access Remote Code Execution; [1
11,9532015/01/20 2014762  ET TROJAN W32/SpyBanker Infection Confirmation Email 2;  
11,9522015/01/20 2014761  ET POLICY Internal Host Getting External IP Address - ip2city.asp;  
11,9512015/01/20 2014760  ET TROJAN W32/Votwup.Backdoor Checkin;  
11,9502015/01/20 2014759  ET TROJAN Trojan.BAT.Qhost Response from Controller;  
11,9492015/01/20 2014758  ET TROJAN Trojan.BAT.Qhost - SET;  
11,9482015/01/20 2014757  ET TROJAN Win32/Comrerop Checkin to FTP server;  
11,9472015/01/20 2014756  ET POLICY Logmein.com/Join.me SSL Remote Control Access;  
11,9462015/01/20 2014755  ET TROJAN W32/HupigonUser.Backdoor Rabclib UA Checkin;  
11,9452015/01/20 2014754  ET TROJAN W32/Mepaow.Backdoor Initial Checkin to Intermediary Pre-CnC; [1,2
11,9442015/01/20 2014753  ET DELETED probable malicious Glazunov Javascript injection;  
11,9432015/01/20 2014752  ET TROJAN Win32.HLLW.Autoruner USA_Load UA; [1
11,9422015/01/20 2014751  ET CURRENT_EVENTS Nuclear/Safe/CritX/FlashPack - Java Request - 32char hex-ascii;  
11,9412015/01/20 2014750  ET CURRENT_EVENTS Incognito/RedKit Exploit Kit vulnerable Java payload request to /1digit.html;  
11,9402015/01/20 2014749  ET CURRENT_EVENTS Redkit Java Exploit request to /24842.jar;  
11,9392015/01/20 2014748  ET DELETED RedKit Repeated Exploit Request Pattern; [1,2,3,4
11,9382015/01/20 2014747  ET DELETED Blackhole Try Prototype Catch May 14 2012;  
11,9372015/01/20 2014746  ET DELETED Blackhole Java Exploit request to /Set.jar;  
11,9362015/01/20 2014745  ET DELETED Blackhole Try Prototype Catch May 11 2012;  
11,9352015/01/20 2014744  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdOpen Method Access Buffer Overflow 2; [1
11,9342015/01/20 2014743  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdOpen Method Access Buffer Overflow; [1
11,9332015/01/20 2014742  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdImport Method Access Buffer Overflow 2; [1
11,9322015/01/20 2014741  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdImport Method Access Buffer Overflow; [1
11,9312015/01/20 2014740  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdExport Method Access Buffer Overflow 2; [1
11,9302015/01/20 2014739  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdExport Method Access Buffer Overflow; [1
11,9292015/01/20 2014738  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdSave Method Access Buffer Overflow 2; [1
11,9282015/01/20 2014737  ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdSave Method Access Buffer Overflow; [1
11,9272015/01/20 2014736  ET WEB_SPECIFIC_APPS Andromeda Streaming MP3 Server andromeda.php Cross-Site Scripting Attempt; [1
11,9262015/01/20 2014735  ET MALWARE Malicious file bitdefender_isecurity.exe download;  
11,9252015/01/20 2014734  ET P2P BitTorrent - Torrent File Downloaded;  
11,9242015/01/20 2014733  ET TROJAN Snap Bot Receiving DDoS Command; [1
11,9232015/01/20 2014732  ET TROJAN Snap Bot Receiving Download Command; [1
11,9222015/01/20 2014731  ET TROJAN Snap Bot Checkin; [1
11,9212015/01/20 2014730  ET DELETED Potential FAKEAV Download a-f0-9 x16 download;  
11,9202015/01/20 2014729  ET CURRENT_EVENTS FakeAV Landing Page - Viruses were found;  
11,9192015/01/20 2014728  ET TROJAN Smoke Loader Checkin r=gate;  
11,9182015/01/20 2014727  ET POLICY Outdated Mac Flash Version;  
11,9172015/01/20 2014726  ET POLICY Outdated Windows Flash Version IE; [1
11,9162015/01/20 2014725  ET CURRENT_EVENTS Possible Request for Blackhole Exploit Kit Landing Page - src.php?case=;  
11,9152015/01/20 2014724  ET DELETED Blackhole Java Exploit request to /Cal.jar;  
11,9142015/01/20 2014723  ET TROJAN Suspicious lcon http header in response seen with Medfos/Midhos downloader;  
11,9132015/01/20 2014722  ET TROJAN Medfos/Midhos Checkin;  
11,9122015/01/20 2014721  ET TROJAN Boatz Checkin; [1
< 301  302  303  304  305  306  307  308  309  310 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.