시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
14,2112015/01/20 2017089  ET WEB_SERVER WebShell - Pouya - Pouya_Server Shell;  
14,2102015/01/20 2017088  ET WEB_SERVER WebShell - GODSPy - Auth Creds;  
14,2092015/01/20 2017087  ET WEB_SERVER WebShell - GODSpy - Auth Prompt;  
14,2082015/01/20 2017086  ET WEB_SERVER WebShell - GODSpy - MySQL;  
14,2072015/01/20 2017085  ET WEB_SERVER WebShell - GODSpy - Cookie;  
14,2062015/01/20 2017084  ET WEB_SERVER WebShell - GODSpy - GODSpy title;  
14,2052015/01/20 2017083  ET WEB_SERVER WebShell - GODSpy - GOD Hacker;  
14,2042015/01/20 2017082  ET INFO ClearTextAuth - HTTP - http_client_body contains pasa form;  
14,2032015/01/20 2017081  ET INFO ClearTextAuth - HTTP - http_uri contains pasa=;  
14,2022015/01/20 2017080  ET INFO ClearTextAuth - HTTP - http_client_body contains pasa=;  
14,2012015/01/20 2017079  ET CURRENT_EVENTS Sibhost Status Check GET Jul 01 2013;  
14,2002015/01/20 2017078  ET CURRENT_EVENTS Lucky7 Java Exploit URI Struct June 28 2013;  
14,1992015/01/20 2017077  ET CURRENT_EVENTS Redirect to DotkaChef EK Landing;  
14,1982015/01/20 2017076  ET CURRENT_EVENTS BlackHole EK Variant Payload Download;  
14,1972015/01/20 2017075  ET CURRENT_EVENTS Sweet Orange applet structure June 27 2013;  
14,1962015/01/20 2017074  ET WEB_SPECIFIC_APPS MoinMoin twikidraw Action Traversal File Upload; [1,2
14,1952015/01/20 2017073  ET CURRENT_EVENTS Cool Exploit Kit iframe with obfuscated Java version check Jun 26 2013;  
14,1942015/01/20 2017072  ET DELETED Blackhole/Cool plugindetect in octal Jun 26 2013;  
14,1932015/01/20 2017071  ET CURRENT_EVENTS Neutrino Exploit Kit XOR decodeURIComponent;  
14,1922015/01/20 2017070  ET CURRENT_EVENTS Applet tag in jjencode as (as seen in Dotka Chef EK);  
14,1912015/01/20 2017069  ET CURRENT_EVENTS Neutrino Exploit Kit Clicker.php TDS; [1
14,1902015/01/20 2017068  ET CURRENT_EVENTS Neutrino Exploit Kit Redirector To Landing Page; [1
14,1892015/01/20 2017067  ET USER_AGENTS Suspicious user agent (Google page);  
14,1882015/01/20 2017066  ET TROJAN Win32/Comisproc Checkin; [1,2,3
14,1872015/01/20 2017065  ET CURRENT_EVENTS Pony Loader default URI struct;  
14,1862015/01/20 2017064  ET CURRENT_EVENTS Cool/BHEK/Goon Applet with Alpha-Numeric Encoded HTML entity;  
14,1852015/01/20 2017063  ET EXPLOIT SolusVM WHMCS CURL Multi-part Boundary Issue; [1
14,1842015/01/20 2017061  ET EXPLOIT SolusVM 1.13.03 Access to solusvmc-node setuid bin;  
14,1832015/01/20 2017060  ET EXPLOIT SolusVM 1.13.03 SQL injection;  
14,1822015/01/20 2017059  ET CURRENT_EVENTS AryaN IRC bot Botkill command;  
14,1812015/01/20 2017058  ET CURRENT_EVENTS AryaN IRC bot Flood command;  
14,1802015/01/20 2017057  ET CURRENT_EVENTS AryaN IRC bot Download and Execute Scheduled file command;  
14,1792015/01/20 2017056  ET CURRENT_EVENTS AryaN IRC bot CnC2;  
14,1782015/01/20 2017055  ET CURRENT_EVENTS AryaN IRC bot CnC1;  
14,1772015/01/20 2017054  ET WEB_SERVER WebShell Generic - ELF File Uploaded;  
14,1762015/01/20 2017053  ET TROJAN Poison Ivy [server response];  
14,1752015/01/20 2017052  ET TROJAN Poison Ivy [victim beacon];  
14,1742015/01/20 2017051  ET TROJAN Drive Receiving UDP DDoS instructions; [1
14,1732015/01/20 2017050  ET TROJAN Drive Receiving IP2 DDoS instructions; [1
14,1722015/01/20 2017049  ET TROJAN Drive Receiving IP DDoS instructions; [1
14,1712015/01/20 2017048  ET TROJAN Drive Receiving POST2 DDoS instructions; [1
14,1702015/01/20 2017047  ET TROJAN Drive Receiving POST1 DDoS instructions; [1
14,1692015/01/20 2017046  ET TROJAN Drive Receiving GET DDoS instructions; [1
14,1682015/01/20 2017045  ET TROJAN Possible Drive DDoS Check-in;  
14,1672015/01/20 2017044  ET CURRENT_EVENTS Rawin Exploit Kit Jar 1.6 (New);  
14,1662015/01/20 2017043  ET CURRENT_EVENTS Rawin Exploit Kit Jar 1.6 (New);  
14,1652015/01/20 2017042  ET CURRENT_EVENTS Rawin Exploit Kit Jar 1.6 (Old);  
14,1642015/01/20 2017041  ET CURRENT_EVENTS Rawin Exploit Kit Jar 1.7.x;  
14,1632015/01/20 2017040  ET CURRENT_EVENTS Rawin Exploit Kit Landing URI Struct;  
14,1622015/01/20 2017039  ET CURRENT_EVENTS X20 EK Payload Download;  
< 251  252  253  254  255  256  257  258  259  260 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.