시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,4612015/01/20 2016317  ET TROJAN Suspicious user-agent (f**king);  
13,4602015/01/20 2016316  ET TROJAN W32/StartPage.eba Dropper Checkin; [1
13,4592015/01/20 2016315  ET DELETED Linux/SSHDoor.A User Login CnC Beacon; [1
13,4582015/01/20 2016314  ET TROJAN Linux/SSHDoor.A Reporting Backdoor CnC Beacon; [1
13,4572015/01/20 2016313  ET TROJAN W32/DownloaderAgent.fajk Second Stage Download List Requested; [1
13,4562015/01/20 2016312  ET TROJAN W32/DownloaderAgent.fajk Successful Infection CnC Beacon; [1
13,4552015/01/20 2016311  ET CURRENT_EVENTS Non-Standard HTML page in Joomla /com_content/ dir (Observed in Recent Pharma Spam);  
13,4542015/01/20 2016310  ET CURRENT_EVENTS JDB Exploit Kit Fake Adobe Download;  
13,4532015/01/20 2016309  ET CURRENT_EVENTS JDB Exploit Kit JAR Download;  
13,4522015/01/20 2016308  ET CURRENT_EVENTS Possible JDB Exploit Kit Class Request;  
13,4512015/01/20 2016307  ET CURRENT_EVENTS JDB Exploit Kit Landing Page;  
13,4502015/01/20 2016306  ET CURRENT_EVENTS JDB Exploit Kit Landing URL structure;  
13,4492015/01/20 2016305  ET WEB_SERVER Ruby on Rails CVE-2013-0333 Attempt; [1
13,4482015/01/20 2016304  ET INFO UPnP Discovery Search Response vulnerable UPnP device 3; [1,2
13,4472015/01/20 2016303  ET INFO UPnP Discovery Search Response vulnerable UPnP device 2; [1,2
13,4462015/01/20 2016302  ET INFO UPnP Discovery Search Response vulnerable UPnP device 1; [1,2
13,4452015/01/20 2016300  ET TROJAN Simda.C Checkin;  
13,4442015/01/20 2016299  ET CURRENT_EVENTS Redkit Class Request (3);  
13,4432015/01/20 2016298  ET CURRENT_EVENTS Malicious iframe;  
13,4422015/01/20 2016297  ET CURRENT_EVENTS Malicious iframe;  
13,4412015/01/20 2016296  ET WEB_SPECIFIC_APPS Jenkins Script Console Usage (Metasploit Unix Shell);  
13,4402015/01/20 2016295  ET WEB_SPECIFIC_APPS Jenkins Script Console Usage (Metasploit Windows CMD Shell);  
13,4392015/01/20 2016294  ET WEB_SPECIFIC_APPS Jenkins Script Console Usage (Can be Used to Spawn Shell);  
13,4382015/01/20 2016293  ET TROJAN RevProxy - ClickFraud - MIDUIDEND;  
13,4372015/01/20 2016292  ET TROJAN Mashigoom/Tranwos/RevProxy ClickFraud - hello;  
13,4362015/01/20 2016291  ET WEB_SPECIFIC_APPS phpMiniAdmin db Parameter Cross Site Scripting Attempt; [1
13,4352015/01/20 2016290  ET WEB_SPECIFIC_APPS web wiz forums ThreadPage Parameter Cross Site Scripting Attempt; [1
13,4342015/01/20 2016289  ET WEB_SPECIFIC_APPS web wiz forums ForumID Parameter Cross Site Scripting Attempt; [1
13,4332015/01/20 2016288  ET WEB_SPECIFIC_APPS Joomla com_collector Component Arbitrary File Upload Vulnerability; [1
13,4322015/01/20 2016287  ET WEB_SPECIFIC_APPS Banana Dance name Parameter Local File Inclusion Attempt; [1
13,4312015/01/20 2016286  ET ACTIVEX Possible Aloaha PDF Crypter activex SaveToFile method arbitrary file overwrite; [1
13,4302015/01/20 2016285  ET WEB_SPECIFIC_APPS GetSimple CMS path parameter Local File Inclusion Attempt; [1
13,4292015/01/20 2016284  ET WEB_SPECIFIC_APPS CubeCart loc parameter Local File Inclusion Attempt; [1
13,4282015/01/20 2016283  ET WEB_SPECIFIC_APPS Openconstructor CMS keyword Parameter Cross Site Scripting Attempt; [1
13,4272015/01/20 2016282  ET WEB_SPECIFIC_APPS Openconstructor CMS result Parameter Cross Site Scripting Attempt; [1
13,4262015/01/20 2016281  ET DELETED Win32/Kelihos.F Checkin 13;  
13,4252015/01/20 2016280  ET CURRENT_EVENTS CoolEK Payload Download (3);  
13,4242015/01/20 2016279  ET CURRENT_EVENTS CoolEK Payload Download (2);  
13,4232015/01/20 2016278  ET CURRENT_EVENTS CoolEK - New PDF Exploit - Jan 24 2013;  
13,4222015/01/20 2016277  ET CURRENT_EVENTS MetaSploit CVE-2012-1723 Class File (seen in live EKs);  
13,4212015/01/20 2016276  ET CURRENT_EVENTS MetaSploit CVE-2012-1723 Class File (seen in live EKs);  
13,4202015/01/20 2016275  ET TROJAN Win32/Xtrat.A Checkin; [1
13,4192015/01/20 2016274  ET TROJAN W32/Bilakip.A Downloader Viruslist Download For Populating FakeAV; [1
13,4182015/01/20 2016273  ET TROJAN W32/Bilakip.A Downloader API Ping CnC Beacon; [1
13,4172015/01/20 2016272  ET CURRENT_EVENTS TDS - in.php;  
13,4162015/01/20 2016271  ET TROJAN Poison Ivy Variant Jan 24 2013; [1
13,4152015/01/20 2016270  ET TROJAN Poison Ivy Variant Jan 24 2013; [1
13,4142015/01/20 2016268  ET DELETED Win32/Kelihos.F Checkin 12;  
13,4132015/01/20 2016267  ET DELETED Win32/Kelihos.F Checkin 11;  
13,4122015/01/20 2016266  ET DELETED Win32/Kelihos.F Checkin 10;  
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.