시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
12,7612015/01/20 2015581  ET TROJAN Atadommoc.C - HTTP CnC;  
12,7602015/01/20 2015580  ET DELETED Blackhole Replace JavaScript Large Obfuscated Blob - August 3rd 2012;  
12,7592015/01/20 2015579  ET DELETED Blackhole Exploit Kit Landing Page Structure;  
12,7582015/01/20 2015578  ET CURRENT_EVENTS Obfuscated Javascript redirecting to badness August 6 2012;  
12,7572015/01/20 2015577  ET TROJAN W32/Lile.A DoS Outbound; [1
12,7562015/01/20 2015576  ET POLICY DNS Query to tor2web Domain (.onion proxy); [1
12,7552015/01/20 2015575  ET CURRENT_EVENTS KaiXin Exploit Kit Java Class; [1
12,7542015/01/20 2015574  ET CURRENT_EVENTS DoSWF Flash Encryption (Used in KaiXin Exploit Kit); [1
12,7532015/01/20 2015573  ET CURRENT_EVENTS Yszz JS/Encryption (Used in KaiXin Exploit Kit); [1
12,7522015/01/20 2015572  ET WEB_SPECIFIC_APPS TEMENOS T24 skin parameter Cross-Site Scripting Attempt; [1
12,7512015/01/20 2015571  ET WEB_SPECIFIC_APPS pragmaMx img_url parameter Cross-Site Scripting Attempt; [1
12,7502015/01/20 2015570  ET WEB_SPECIFIC_APPS Joomla com_mailchimpccnewsletter controller parameter Local File Inclusion Attempt; [1
12,7492015/01/20 2015569  ET WEB_SPECIFIC_APPS Joomla Bsadv controller parameter Local File Inclusion Attempt; [1
12,7482015/01/20 2015568  ET WEB_SPECIFIC_APPS Joomla com_jeformcr view parameter Local File Inclusion Attempt; [1
12,7472015/01/20 2015567  ET ACTIVEX Possible AOL ICQ ActiveX Control DownloadAgent Method Access Arbitrary File Download and Execute 2; [1
12,7462015/01/20 2015566  ET ACTIVEX Possible AOL ICQ ActiveX Control DownloadAgent Method Access Arbitrary File Download and Execute; [1
12,7452015/01/20 2015565  ET WEB_SPECIFIC_APPS ManageEngine Applications Manager attributeToSelect parameter Cross-Site Script Attempt; [1
12,7442015/01/20 2015564  ET ACTIVEX Possible BarCodeWiz (BARCODEWIZLib.BarCodeWiz) ActiveX Control Buffer Overflow; [1
12,7432015/01/20 2015563  ET ACTIVEX Possible BarCodeWiz BarcodeWiz.dll ActiveX Control Barcode Method Remote Buffer Overflow Attempt; [1
12,7422015/01/20 2015562  ET TROJAN Trojan.Win32.Jorik.Totem.vg HTTP request;  
12,7412015/01/20 2015561  ET INFO PDF Using CCITTFax Filter; [1,2
12,7402015/01/20 2015560  ET TROJAN ABUSE.CH SSL Fingerprint Blacklist Malicious SSL certificate detected (Shylock C2); [1
12,7392015/01/20 2015559  ET CURRENT_EVENTS Cridex Self Signed SSL Certificate (TR, Some-State, Internet Widgits);  
12,7382015/01/20 2015558  ET DELETED g01pack Exploit Kit Landing Page 3;  
12,7372015/01/20 2015557  ET WEB_CLIENT Potential MSXML2.FreeThreadedDOMDocument Uninitialized Memory Corruption Attempt;  
12,7362015/01/20 2015556  ET WEB_CLIENT Potential MSXML2.DOMDocument ActiveXObject Uninitialized Memory Corruption Attempt;  
12,7352015/01/20 2015555  ET WEB_CLIENT Potential MSXML2.DOMDocument.4-6.0 Uninitialized Memory Corruption CVE-2012-1889;  
12,7342015/01/20 2015554  ET WEB_CLIENT Potential MSXML2.DOM Document.3.0 Uninitialized Memory Corruption Attempt;  
12,7332015/01/20 2015553  ET CURRENT_EVENTS Fake-AV Conditional Redirect (Blackmuscats); [1
12,7322015/01/20 2015552  ET SCAN HTExploit Method; [1
12,7312015/01/20 2015551  ET INFO HTTP Request to a *.upas.su domain;  
12,7302015/01/20 2015550  ET DNS Query for a Suspicious *.upas.su domain;  
12,7292015/01/20 2015549  ET DELETED g01pack Exploit Kit Landing Page 2;  
12,7282015/01/20 2015548  ET CURRENT_EVENTS g01pack Exploit Kit Landing Page;  
12,7272015/01/20 2015547  ET TROJAN Pakes2 - EXE Download Request;  
12,7262015/01/20 2015546  ET TROJAN Trojan Cridex checkin; [1,2
12,7252015/01/20 2015545  ET WEB_SPECIFIC_APPS Joomla PollXT component Itemid parameter Local File Inclusion Attempt; [1
12,7242015/01/20 2015544  ET WEB_SPECIFIC_APPS phpProfiles topic_title parameter Cross-Site Scripting Attempt; [1
12,7232015/01/20 2015543  ET WEB_SPECIFIC_APPS phpProfiles menu Parameter Remote File Inclusion Attempt; [1
12,7222015/01/20 2015542  ET WEB_SPECIFIC_APPS Wordpress clickdesk-live-support-chat plugin cdwidgetid parameter Cross-Site Scripting Attempt; [1
12,7212015/01/20 2015541  ET WEB_SPECIFIC_APPS Commentics id parameter Cross-Site Scripting Attempt; [1
12,7202015/01/20 2015540  ET WEB_SPECIFIC_APPS Joomla com_picasa2gallery controller parameter Local File Inclusion vulnerability; [1
12,7192015/01/20 2015539  ET ACTIVEX Possible WinZip FileView (WZFILEVIEW.FileViewCtrl.61) ActiveX Buffer Overflow 2; [1
12,7182015/01/20 2015538  ET ACTIVEX Possible WinZip FileView ActiveX CreateNewFolderFromName Method Access Buffer Overflow; [1
12,7172015/01/20 2015537  ET ACTIVEX Possible Symantec AppStream LaunchObj ActiveX Control Arbitrary File Download and Execute; [1
12,7162015/01/20 2015536  ET WEB_SPECIFIC_APPS Wordpress featurific-for-wordpress plugin snum parameter Cross-Site Scripting Attempt; [1
12,7152015/01/20 2015535  ET TROJAN ZeroAccess HTTP GET request;  
12,7142015/01/20 2015534  ET TROJAN Karagany checkin (sid5 2);  
12,7132015/01/20 2015533  ET TROJAN Karagany checkin (sid5 1);  
12,7122015/01/20 2015532  ET TROJAN Generic - ProxyJudge Reverse Proxy Scoring Activity;  
< 281  282  283  284  285  286  287  288  289  290 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.