시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,2112015/01/20 2016064  ET DELETED Popads Exploit Kit font request 32hex digit .eot;  
13,2102015/01/20 2016063  ET CURRENT_EVENTS PHISH PayPal - Account Phished;  
13,2092015/01/20 2016062  ET TROJAN Linux/Chapro.A Malicious Apache Module CnC Beacon; [1
13,2082015/01/20 2016061  ET WEB_SPECIFIC_APPS Possible WordpressPingbackPortScanner detected; [1,2,3
13,2072015/01/20 2016060  ET CURRENT_EVENTS CoolEK - Jar - Jun 05 2013;  
13,2062015/01/20 2016059  ET CURRENT_EVENTS CoolEK - Old PDF Exploit - Dec 18 2012;  
13,2052015/01/20 2016058  ET DELETED CoolEK - New PDF Exploit - Dec 18 2012;  
13,2042015/01/20 2016057  ET DELETED CoolEK Font File Download Dec 18 2012;  
13,2032015/01/20 2016056  ET CURRENT_EVENTS Unknown_gmf EK - flsh.html;  
13,2022015/01/20 2016055  ET CURRENT_EVENTS Unknown_gmf EK - pdfx.html;  
13,2012015/01/20 2016054  ET CURRENT_EVENTS Unknown_gmf EK - Server Response - Application Error;  
13,2002015/01/20 2016053  ET CURRENT_EVENTS Unknown_gmf EK - Payload Download Received;  
13,1992015/01/20 2016052  ET CURRENT_EVENTS Unknown_gmf EK - Payload Download Requested;  
13,1982015/01/20 2016051  ET TROJAN W32.Daws/Sanny CnC POST; [1,2
13,1972015/01/20 2016050  ET TROJAN W32.Daws/Sanny CnC Initial Beacon; [1,2
13,1962015/01/20 2016049  ET TROJAN W32/Prinimalka Prinimalka.py Script In CnC Beacon; [1
13,1952015/01/20 2016048  ET TROJAN W32/Prinimalka Configuration Update Request; [1
13,1942015/01/20 2016047  ET TROJAN W32/Prinimalka Get Task CnC Beacon; [1
13,1932015/01/20 2016046  ET DELETED SofosFO/NeoSploit possible second stage landing page (2);  
13,1922015/01/20 2016045  ET WEB_SPECIFIC_APPS Admidio headline parameter Cross Site Scripting Attempt; [1
13,1912015/01/20 2016044  ET WEB_SPECIFIC_APPS RIPS function.php Local File Inclusion Vulnerability; [1
13,1902015/01/20 2016043  ET WEB_SPECIFIC_APPS RIPS code.php Local File Inclusion Vulnerability; [1
13,1892015/01/20 2016042  ET WEB_SPECIFIC_APPS Manhali download.php Local File Inclusion Vulnerability; [1
13,1882015/01/20 2016041  ET ACTIVEX Possible NVIDIA Install Application ActiveX Control AddPackages Unicode Buffer Overflow; [1
13,1872015/01/20 2016040  ET WEB_SPECIFIC_APPS SimpleInvoices having parameter Cross Site Scripting Attempt; [1
13,1862015/01/20 2016039  ET WEB_SPECIFIC_APPS Havalite userId parameter Cross Site Scripting Attempt; [1
13,1852015/01/20 2016038  ET WEB_SPECIFIC_APPS WordPress FSML Plugin fsml-hideshow.js.php Remote File Inclusion Attempt; [1
13,1842015/01/20 2016037  ET WEB_SPECIFIC_APPS WordPress FSML Plugin fsml-admin.js.php Remote File Inclusion Attempt; [1
13,1832015/01/20 2016036  ET WEB_SPECIFIC_APPS Simplemachines view parameter Cross Site Scripting Attempt; [1
13,1822015/01/20 2016035  ET CURRENT_EVENTS Possible SibHost PDF Request;  
13,1812015/01/20 2016034  ET TROJAN Faked Russian Opera UA without Accept - probable downloader;  
13,1802015/01/20 2016033  ET SCAN Simple Slowloris Flooder; [1
13,1792015/01/20 2016032  ET SCAN JCE Joomla Scanner;  
13,1782015/01/20 2016031  ET DOS LOIC GET;  
13,1772015/01/20 2016030  ET DOS LOIC POST;  
13,1762015/01/20 2016029  ET TROJAN Kelihos.K Executable Download DGA;  
13,1752015/01/20 2016028  ET EXPLOIT Metasploit -Java Atomic Exploit Downloaded;  
13,1742015/01/20 2016027  ET CURRENT_EVENTS g01pack - Landing Page Received - applet and 32AlphaNum.jar;  
13,1732015/01/20 2016026  ET CURRENT_EVENTS NuclearPack - Landing Page Received - applet and 32HexChar.jar;  
13,1722015/01/20 2016025  ET DELETED Blackhole - TDS Redirection To Exploit Kit - /head/head1.html;  
13,1712015/01/20 2016024  ET CURRENT_EVENTS Blackhole - TDS Redirection To Exploit Kit - Loading;  
13,1702015/01/20 2016023  ET CURRENT_EVENTS MALVERTISING FlashPost - POST to *.stats;  
13,1692015/01/20 2016022  ET CURRENT_EVENTS MALVERTISING FlashPost - Redirection IFRAME;  
13,1682015/01/20 2016021  ET DELETED FakeScan - Payload Download Received;  
13,1672015/01/20 2016020  ET DELETED FakeScan - Landing Page - Title - Microsoft Antivirus 2013;  
13,1662015/01/20 2016019  ET DELETED Win32.boCheMan-A/Dexter;  
13,1652015/01/20 2016018  ET CURRENT_EVENTS Embedded Open Type Font file .eot seeing at Cool Exploit Kit;  
13,1642015/01/20 2016017  ET DOS DNS Amplification Attack Outbound;  
13,1632015/01/20 2016016  ET DOS DNS Amplification Attack Inbound;  
13,1622015/01/20 2016015  ET WEB_SPECIFIC_APPS Nagios XI Network Monitor - OS Command Injection; [1
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.