시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,8112015/01/20 2010172  ET WEB_SPECIFIC_APPS WebSense Email security msgAnalyse.asp IsolatedMessageID XSS Attempt; [1,2
7,8102015/01/20 2010171  ET WEB_SPECIFIC_APPS WebSense Email security msgAnalyse.asp FileName XSS Attempt; [1,2
7,8092015/01/20 2010170  ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp ServerName XSS Attempt; [1,2
7,8082015/01/20 2010169  ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp IsolatedMessageID XSS Attempt; [1,2
7,8072015/01/20 2010168  ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp FileName XSS Attempt; [1,2
7,8062015/01/20 2010167  ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp Queue XSS Attempt; [1,2
7,8052015/01/20 2010165  ET TROJAN Tibs/Harnig Downloader Activity; [1,2,3
7,8042015/01/20 2010164  ET TROJAN Daonol C&C Communication; [1,2,3,4,5
7,8032015/01/20 2010163  ET TROJAN Glacial Dracon C&C Communication; [1,2,3
7,8022015/01/20 2010162  ET WEB_SERVER Possible Successful Juniper NetScreen ScreenOS Firmware Version Disclosure Attempt; [1,2,3,4,5
7,8012015/01/20 2010161  ET ACTIVEX Possible Edraw PDF Viewer FtpConnect Component ActiveX Remote code execution Attempt; [1,2
7,8002015/01/20 2010160  ET ACTIVEX Possible AOL IWinAmp ActiveX ConvertFile Buffer Overflow Attempt; [1,2,3
7,7992015/01/20 2010159  ET WEB_SERVER Possible 3Com OfficeConnect Router Default User Account Remote Command Execution Attempt; [1,2,3,4
7,7982015/01/20 2010158  ET TROJAN Nanspy Bot Checkin; [1
7,7972015/01/20 2010157  ET POLICY Suspicious User-Agent (XXX) Often Sony Update Related; [1
7,7962015/01/20 2010156  ET GAMES Alien Arena 7.30 Remote Code Execution Attempt; [1,2
7,7952015/01/20 2010155  ET ACTIVEX EMC Captiva PixTools ActiveX Arbitrary File Creation/Overwrite function call Attempt; [1,2,3
7,7942015/01/20 2010154  ET ACTIVEX EMC Captiva PixTools ActiveX Arbitrary File Creation/Overwrite function call Attempt; [1,2,3
7,7932015/01/20 2010153  ET TROJAN Koobface fetch C&C command detected; [1,2
7,7922015/01/20 2010152  ET TROJAN Koobface C&C availability check successful; [1,2
7,7912015/01/20 2010151  ET TROJAN Koobface C&C availability check; [1,2
7,7902015/01/20 2010150  ET TROJAN Koobface HTTP Request (2); [1,2
7,7892015/01/20 2010148  ET TROJAN DHL Spam Inbound; [1
7,7882015/01/20 2010147  ET WEB_SPECIFIC_APPS Possible bloofoxCMS 'search' Parameter Cross Site Scripting Attempt; [1,2
7,7872015/01/20 2010146  ET WEB_SPECIFIC_APPS Possible Apache Tomcat Host Manager Cross Site Scripting Attempt; [1,2
7,7862015/01/20 2010145  ET WEB_SPECIFIC_APPS Possible IBM Rational RequisitePro ReqWebHelp Cross Site Scripting Attempt; [1,2,3
7,7852015/01/20 2010144  ET P2P Vuze BT UDP Connection (5); [1,2
7,7842015/01/20 2010143  ET P2P Vuze BT UDP Connection (4); [1
7,7832015/01/20 2010142  ET P2P Vuze BT UDP Connection (3); [1
7,7822015/01/20 2010141  ET P2P Vuze BT UDP Connection (2); [1,2
7,7812015/01/20 2010140  ET P2P Vuze BT UDP Connection; [1,2
7,7802015/01/20 2010139  ET P2P Vuze BT Connection; [1,2
7,7792015/01/20 2010138  ET TROJAN Possible Win32/Agent.QBY CnC Post; [1,2
7,7782015/01/20 2010137  ET MALWARE Suspicious User-Agent (Sme32); [1
7,7772015/01/20 2010136  ET DELETED Suspicious User-Agent (asp2009); [1,2
7,7762015/01/20 2010135  ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable UPDATE SET SQL Injection Attempt; [1,2,3,4
7,7752015/01/20 2010134  ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable DELETE FROM SQL Injection Attempt; [1,2,3,4
7,7742015/01/20 2010133  ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable INSERT INTO SQL Injection Attempt; [1,2,3,4
7,7732015/01/20 2010132  ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable SELECT FROM SQL Injection Attempt; [1,2,3,4
7,7722015/01/20 2010131  ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable UNION SELECT SQL Injection Attempt; [1,2,3,4
7,7712015/01/20 2010129  ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER-AgENt); [1
7,7702015/01/20 2010127  ET WEB_SPECIFIC_APPS Ultrize TimeSheet timesheet.php include_dir Parameter Local File Inclusion; [1,2,3
7,7692015/01/20 2010126  ET WEB_SPECIFIC_APPS Ultrize TimeSheet timesheet.php include_dir Parameter Remote File Inclusion; [1,2,3
7,7682015/01/20 2010125  ET WEB_SPECIFIC_APPS SERWeb main_prepend.php functionsdir Parameter Remote File Inclusion; [1,2
7,7672015/01/20 2010124  ET WEB_SPECIFIC_APPS SERWeb load_lang.php configdir Parameter Remote File Inclusion; [1,2
7,7662015/01/20 2010123  ET WEB_SPECIFIC_APPS NewSolved newsscript.php newsid Parameter SQL Injection; [1,2,3
7,7652015/01/20 2010122  ET WEB_SPECIFIC_APPS NewSolved newsscript.php idneu Parameter SQL Injection; [1,2,3
7,7642015/01/20 2010121  ET WEB_SPECIFIC_APPS Celepar module for Xoops aviso.php codigo SQL injection; [1,2,3
7,7632015/01/20 2010119  ET WEB_SERVER xp_cmdshell Attempt in Cookie; [1,2,3,4
7,7622015/01/20 2010101  ET TROJAN Palevo/BFBot/Mariposa server join acknowledgement; [1,2,3,4,5,6
< 381  382  383  384  385  386  387  388  389  390 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.