시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,6612015/01/20 2014434  ET DELETED Microsoft Remote Desktop Protocol (RDP) maxChannelIds DoS Attempt 4 byte; [1,2,3,4,5,6
11,6602015/01/20 2014433  ET DELETED Microsoft Remote Desktop Protocol (RDP) maxChannelIds DoS Attempt 3 byte; [1,2,3,4,5,6
11,6592015/01/20 2014432  ET DELETED Microsoft Remote Desktop Protocol (RDP) maxChannelIds DoS Attempt 2 byte; [1,2,3,4,5,6
11,6582015/01/20 2014431  ET DOS Microsoft Remote Desktop Protocol (RDP) maxChannelIds DoS Attempt; [1,2,3,4,5,6
11,6572015/01/20 2014430  ET DOS Microsoft Remote Desktop Protocol (RDP) maxChannelIds DoS Attempt Negative INT; [1,2,3,4,5,6
11,6562015/01/20 2014429  ET CURRENT_EVENTS Java Rhino Exploit Attempt - evilcode.class;  
11,6552015/01/20 2014428  ET TROJAN SpyEye Checkin version 1.3.25 or later 3;  
11,6542015/01/20 2014427  ET WEB_SPECIFIC_APPS Greenpeace.fr filter_dpt Parameter Cross Site Scripting Attempt; [1
11,6532015/01/20 2014426  ET WEB_SPECIFIC_APPS WikyBlog which Parameter Cross Site Scripting Attempt; [1
11,6522015/01/20 2014425  ET WEB_SPECIFIC_APPS OneFileCMS f parameter Local File Inclusion Attempt; [1
11,6512015/01/20 2014424  ET WEB_SPECIFIC_APPS VTiger CRM module_name parameter Local File Inclusion Attempt; [1
11,6502015/01/20 2014423  ET ACTIVEX 2X Client for RDP ClientSystem Class ActiveX Control InstallClient Function Call Attempt; [1
11,6492015/01/20 2014422  ET ACTIVEX 2X Client for RDP ClientSystem Class ActiveX Control InstallClient Download and Execute; [1
11,6482015/01/20 2014421  ET ACTIVEX 2X ApplicationServer TuxSystem Class ActiveX Control ExportSettings Function Call Attempt; [1
11,6472015/01/20 2014420  ET ACTIVEX 2X ApplicationServer TuxSystem Class ActiveX Control ExportSettings Remote File Overwrite Attempt; [1
11,6462015/01/20 2014419  ET ACTIVEX 2X ApplicationServer TuxSystem Class ActiveX Control ImportSettings Function Call Attempt; [1
11,6452015/01/20 2014418  ET ACTIVEX 2X ApplicationServer TuxSystem Class ActiveX Control ImportSettings Remote File Overwrite Attempt; [1
11,6442015/01/20 2014417  ET ACTIVEX Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT ActiveX Control PlayerPT.ocx Access 2; [1
11,6432015/01/20 2014416  ET ACTIVEX Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT ActiveX Control PlayerPT.ocx Access 1; [1
11,6422015/01/20 2014415  ET CURRENT_EVENTS Blackhole Exploit Kit JavaScript dotted quad hostile applet; [1
11,6412015/01/20 2014414  ET CURRENT_EVENTS DRIVEBY Blackhole Landing Page applet param window.document;  
11,6402015/01/20 2014413  ET CURRENT_EVENTS DRIVEBY Blackhole client=done Cookie Present;  
11,6392015/01/20 2014412  ET CURRENT_EVENTS DRIVEBY Blackhole client=done Cookie Set;  
11,6382015/01/20 2014411  ET TROJAN Fareit/Pony Downloader Checkin 2; [1,2,3
11,6372015/01/20 2014410  ET TROJAN Backdoor.Win32.Ixeshe; [1
11,6362015/01/20 2014409  ET TROJAN FakeAV.dfze/FakeAV!IK Checkin;  
11,6352015/01/20 2014408  ET CURRENT_EVENTS DRIVEBY EgyPack Exploit Kit Cookie Present; [1,2,3
11,6342015/01/20 2014407  ET CURRENT_EVENTS DRIVEBY EgyPack Exploit Kit Cookie Set; [1,2,3
11,6332015/01/20 2014406  ET MOBILE_MALWARE iOS Keylogger iKeyMonitor access; [1
11,6322015/01/20 2014405  ET TROJAN Cridex.B/Feodo Checkin; [1,2,3
11,6312015/01/20 2014404  ET DELETED W32/Bifrose.Backdoor Checkin Attempt via Facebook;  
11,6302015/01/20 2014403  ET MALWARE W32/PaPaPaEdge.Adware/Gambling Poker-Edge Checkin;  
11,6292015/01/20 2014402  ET WORM W32/Rimecud wg.txt Checkin; [1
11,6282015/01/20 2014401  ET WORM W32/Rimecud /qvod/ff.txt Checkin; [1
11,6272015/01/20 2014400  ET MALWARE W32/LoudMo.Adware Checkin; [1
11,6262015/01/20 2014399  ET TROJAN Trojan-Spy.Win32.Zbot.djrm Checkin;  
11,6252015/01/20 2014398  ET TROJAN Generic.KD.291903/Win32.TrojanClicker.Agent.NII Nconfirm Checkin; [1
11,6242015/01/20 2014397  ET WEB_SPECIFIC_APPS EJBCA issuer Parameter Cross Site Scripting Attempt; [1
11,6232015/01/20 2014396  ET WEB_SPECIFIC_APPS Volusion Chat ID Parameter Cross Site Scripting Attempt; [1
11,6222015/01/20 2014395  ET WEB_SPECIFIC_APPS PHP Address Book from Parameter Cross Site Scripting Attempt; [1
11,6212015/01/20 2014394  ET WEB_SPECIFIC_APPS Joomla com_kp controller parameter Local File Inclusion Attempt; [1
11,6202015/01/20 2014393  ET WEB_SPECIFIC_APPS Joomla com_rule controller Local File Inclusion Attempt; [1
11,6192015/01/20 2014392  ET WEB_SPECIFIC_APPS Joomla com_fundhelp controller Local File Inclusion Attempt; [1
11,6182015/01/20 2014391  ET ACTIVEX EdrawSoft Office Viewer Component ActiveX FtpUploadFile Format String Function Call Attempt; [1
11,6172015/01/20 2014390  ET ACTIVEX EdrawSoft Office Viewer Component ActiveX FtpUploadFile Stack Buffer Overflow; [1
11,6162015/01/20 2014389  ET WEB_SPECIFIC_APPS Joomla com_adsmanager mosConfig_absolute_path Remote File inclusion Attempt; [1
11,6152015/01/20 2014388  ET WEB_SPECIFIC_APPS Joomla com_phocadownload folder Parameter Remote File inclusion Attempt; [1
11,6142015/01/20 2014387  ET TROJAN Generic Dropper User-Agent (XXXwww);  
11,6132015/01/20 2014386  ET DOS Microsoft Remote Desktop (RDP) Session Established Flowbit Set;  
11,6122015/01/20 2014385  ET DOS Microsoft Remote Desktop (RDP) Syn/Ack Outbound Flowbit Set;  
< 301  302  303  304  305  306  307  308  309  310 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.