시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,3112015/01/20 2010713  ET WEB_SPECIFIC_APPS Joomla Foobla Suggestions Component idea_id INSERT INTO SQL Injection Attempt; [1
8,3102015/01/20 2010712  ET WEB_SPECIFIC_APPS Joomla Foobla Suggestions Component idea_id UNION SELECT SQL Injection Attempt; [1
8,3092015/01/20 2010711  ET WEB_SPECIFIC_APPS Joomla Foobla Suggestions Component idea_id DELETE FROM SQL Injection Attempt; [1
8,3082015/01/20 2010710  ET WEB_SPECIFIC_APPS Joomla Foobla Suggestions Component idea_id SELECT FROM SQL Injection Attempt; [1
8,3072015/01/20 2010709  ET WEB_SPECIFIC_APPS Dros function.config_load.php _compile_file Remote File Inclusion Attempt; [1,2
8,3062015/01/20 2010708  ET WEB_SPECIFIC_APPS Dros core.process_compiled_include.php smarty Remote File Inclusion Attempt; [1,2
8,3052015/01/20 2010707  ET WEB_SPECIFIC_APPS Dros core.write_compiled_include.php smarty Remote File Inclusion Attempt; [1,2
8,3042015/01/20 2010706  ET POLICY Internet Explorer 6 in use - Significant Security Risk;  
8,3032015/01/20 2010705  ET ACTIVEX Adobe browser document ActiveX DoS Function call Attempt; [1,2
8,3022015/01/20 2010704  ET WEB_SERVER Possible HP OpenView Network Node Manager ovalarm.exe CGI Buffer Overflow Attempt; [1
8,3012015/01/20 2010703  ET ACTIVEX Possible Windows Live Messenger ActiveX Control RichUploadControlContextData Buffer Overflow Function Call Attempt; [1,2
8,3002015/01/20 2010702  ET ACTIVEX Possible Windows Live Messenger ActiveX Control RichUploadControlContextData Buffer Overflow Attempt; [1,2
8,2992015/01/20 2010701  ET WEB_SPECIFIC_APPS VBulletin 4.0.1 SQL Injection Attempt; [1,2
8,2982015/01/20 2010700  ET TROJAN Likely Koobface Beaconing (getexe); [1
8,2972015/01/20 2010699  ET WEB_SPECIFIC_APPS Possible HP Power Manager Management Web Server Login Remote Buffer Overflow Attempt; [1,2
8,2962015/01/20 2010698  ET WEB_SERVER Possible D-Link Router HNAP Protocol Security Bypass Attempt; [1,2
8,2952015/01/20 2010697  ET USER_AGENTS Suspicious User-Agent Beginning with digits - Likely spyware/trojan; [1
8,2942015/01/20 2010696  ET TROJAN Aurora Backdoor (C&C) connection CnC response; [1,2
8,2932015/01/20 2010695  ET TROJAN Aurora Backdoor (C&C) client connection to CnC; [1,2
8,2922015/01/20 2010694  ET ACTIVEX Possible Novell iPrint Client GetDriverSettings ActiveX Control Buffer Overflow Attempt; [1
8,2912015/01/20 2010693  ET ACTIVEX Possible Novell iPrint Client ExecuteRequest ActiveX Control Buffer Overflow Attempt; [1
8,2902015/01/20 2010692  ET ACTIVEX Possible McAfee Remediation Client Enginecom.Dll ActiveX Code Execution Function Call Attempt; [1,2
8,2892015/01/20 2010691  ET ACTIVEX Possible activePDF WebGrabber ActiveX Control Buffer Overflow Attempt; [1,2,3
8,2882015/01/20 2010690  ET ACTIVEX Possible activePDF WebGrabber ActiveX Control Buffer Overflow Function Call Attempt; [1,2,3
8,2872015/01/20 2010687  ET WEB_SERVER HP OpenView Network Node Manager Snmp.exe CGI Buffer Overflow Attempt; [1
8,2862015/01/20 2010686  ET SCAN ICMP =XXXXXXXX Likely Precursor to Scan; [1
8,2852015/01/20 2010684  ET TROJAN Likely Fake Antivirus Download Setup_2012.exe; [1
8,2842015/01/20 2010683  ET DELETED FakeAV AntivirusDoktor2009 User-Agent (657); [1
8,2832015/01/20 2010682  ET DELETED FakeAV AntivirusDoktor2009 User-Agent (768); [1
8,2822015/01/20 2010681  ET SCAN ICMP Delphi, Likely Precursor to Scan; [1,2
8,2812015/01/20 2010680  ET MALWARE chnsystem.com Spyware User-Agent (Update1.0); [1
8,2802015/01/20 2010679  ET MALWARE Trojan.Win32.InternetAntivirus User-Agent (General Antivirus); [1
8,2792015/01/20 2010678  ET TROJAN Win32.OnLineGames User-Agent (BigFoot); [1
8,2782015/01/20 2010677  ET MALWARE Suspicious User-Agent (My Session); [1
8,2772015/01/20 2010676  ET MALWARE User-Agent (Fast Browser Search); [1
8,2762015/01/20 2010675  ET MALWARE User-Agent (SogouExplorerMiniSetup); [1
8,2752015/01/20 2010674  ET DOS Cisco 4200 Wireless Lan Controller Long Authorisation Denial of Service Attempt; [1,2,3
8,2742015/01/20 2010673  ET WEB_SPECIFIC_APPS Possible Zenoss Network Monitoring Application UNTION SELECT SQL Injection Attempt; [1,2
8,2732015/01/20 2010672  ET WEB_SPECIFIC_APPS Possible Zenoss Network Monitoring Application INSERT INTO SQL Injection Attempt; [1,2
8,2722015/01/20 2010670  ET WEB_SPECIFIC_APPS Possible Zenoss Network Monitoring Application SELECT FROM SQL Injection Attempt; [1,2
8,2712015/01/20 2010669  ET WEB_SPECIFIC_APPS Possible Zenoss Network Monitoring Application INTO OUTFILE SQL Injection Attempt; [1,2
8,2702015/01/20 2010667  ET WEB_SERVER /bin/bash In URI, Possible Shell Command Execution Attempt Within Web Exploit; [1
8,2692015/01/20 2010666  ET DELETED Adobe Macromedia Flash Player In Windows XP Remote Arbitrary Code Execution CLSID Access Attempt; [1,2,3,4
8,2682015/01/20 2010665  ET ACTIVEX Possible NOS Microsystems Adobe Reader/Acrobat getPlus Get_atlcomHelper ActiveX Control Multiple Stack Overflows Remote Code Execution Attempt; [1,2,3,4,5
8,2672015/01/20 2010664  ET WEB_CLIENT Possible Adobe Reader and Acrobat Forms Data Format Remote Security Bypass Attempt; [1,2,3
8,2662015/01/20 2010661  ET WEB_SPECIFIC_APPS epay a_affil.php _REQUEST Remote File Inclusion Attempt; [1,2
8,2652015/01/20 2010660  ET WEB_SPECIFIC_APPS Joomla mojoBlog wp-trackback.php Remote File Inclusion Attempt; [1,2
8,2642015/01/20 2010659  ET WEB_SPECIFIC_APPS Joomla mojoBlog wp-comments-post.php Remote File Inclusion Attempt; [1,2
8,2632015/01/20 2010658  ET ACTIVEX EasyMail Object IMAP4 Component Buffer Overflow Function call Attempt; [1,2
8,2622015/01/20 2010657  ET ACTIVEX EasyMail Object SMTP Component Buffer Overflow Function call Attempt; [1,2,3
< 371  372  373  374  375  376  377  378  379  380 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.