시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,1612015/01/20 2016014  ET TROJAN Win32/Trojan.Agent.AXMO CnC Beacon; [1
13,1602015/01/20 2016013  ET CURRENT_EVENTS CritXPack Jar Request (2);  
13,1592015/01/20 2016012  ET CURRENT_EVENTS CritXPack PDF Request (2);  
13,1582015/01/20 2016011  ET TROJAN SmokeBot grab data plaintext;  
13,1572015/01/20 2016010  ET WEB_SPECIFIC_APPS Inventory newtransact.php Cross Site Scripting Attempt; [1
13,1562015/01/20 2016009  ET WEB_SPECIFIC_APPS Inventory newinventario.php Cross Site Scripting Attempt; [1
13,1552015/01/20 2016008  ET WEB_SPECIFIC_APPS Inventory consulta_fact.php Cross Site Scripting Attempt; [1
13,1542015/01/20 2016007  ET WEB_SPECIFIC_APPS PRADO PHP Framework functional.php Local File Inclusion Vulnerability; [1
13,1532015/01/20 2016006  ET WEB_SPECIFIC_APPS PRADO PHP Framework functional_tests.php Local File Inclusion Vulnerability; [1
13,1522015/01/20 2016005  ET WEB_SPECIFIC_APPS Achievo atknodetype parameter Local File Inclusion Vulnerability; [1
13,1512015/01/20 2016004  ET WEB_SPECIFIC_APPS ViArt Shop Evaluation previews_functions.php Remote File Inclusion Attempt; [1
13,1502015/01/20 2016003  ET WEB_SPECIFIC_APPS ViArt Shop Evaluation ajax_list_tree.php Remote File Inclusion Attempt; [1
13,1492015/01/20 2016002  ET WEB_SPECIFIC_APPS ViArt Shop Evaluation admin_header.php Remote File Inclusion Attempt; [1
13,1482015/01/20 2016001  ET CURRENT_EVENTS PDF /XFA and PDF-1.[0-4] Spec Violation (seen in pamdql and other EKs);  
13,1472015/01/20 2016000  ET TROJAN Win32/Necurs; [1
13,1462015/01/20 2015999  ET TROJAN W32/Quarian HTTP Proxy Header; [1
13,1452015/01/20 2015998  ET CURRENT_EVENTS CritXPack Landing Pattern;  
13,1442015/01/20 2015997  ET CURRENT_EVENTS Fake Google Chrome Update/Install; [1,2
13,1432015/01/20 2015996  ET EXPLOIT MySQL Server for Windows Remote SYSTEM Level Exploit (Stuxnet Technique); [1
13,1422015/01/20 2015995  ET EXPLOIT MySQL Server for Windows Remote SYSTEM Level Exploit (Stuxnet Techique DUMP INTO executable); [1
13,1412015/01/20 2015994  ET INFO MySQL Database Query Version OS compile;  
13,1402015/01/20 2015993  ET ATTACK_RESPONSE MySQL User Account Enumeration; [1
13,1392015/01/20 2015992  ET EXPLOIT MySQL (Linux) Database Privilege Elevation (Exploit Specific); [1
13,1382015/01/20 2015991  ET CURRENT_EVENTS Robopak - Landing Page Received;  
13,1372015/01/20 2015990  ET CURRENT_EVENTS RedKit - Potential Payload Requested - /2Digit.html;  
13,1362015/01/20 2015989  ET CURRENT_EVENTS RedKit - Potential Java Exploit Requested - 3 digit jar;  
13,1352015/01/20 2015988  ET CURRENT_EVENTS CrimeBoss - Stats Load Fail;  
13,1342015/01/20 2015987  ET EXPLOIT MySQL Heap based buffer overrun Exploit Specific; [1
13,1332015/01/20 2015986  ET SCAN MYSQL MySQL Remote FAST Account Password Cracking; [1
13,1322015/01/20 2015985  ET TROJAN Win32/Kuluoz.B Request;  
13,1312015/01/20 2015984  ET WEB_SERVER Joomla Component SQLi Attempt;  
13,1302015/01/20 2015983  ET CURRENT_EVENTS PHISH Bank - York - Creds Phished;  
13,1292015/01/20 2015982  ET CURRENT_EVENTS Zuponcic Hostile JavaScript;  
13,1282015/01/20 2015981  ET CURRENT_EVENTS Zuponcic Hostile Jar;  
13,1272015/01/20 2015980  ET CURRENT_EVENTS PHISH Google - Account Phished;  
13,1262015/01/20 2015979  ET CURRENT_EVENTS CritXPack - Landing Page;  
13,1252015/01/20 2015978  ET CURRENT_EVENTS Blackhole Java applet with obfuscated URL Dec 03 2012;  
13,1242015/01/20 2015977  ET CURRENT_EVENTS probable malicious Glazunov Javascript injection;  
13,1232015/01/20 2015976  ET TROJAN WORM_VOBFUS Checkin Generic; [1,2
13,1222015/01/20 2015975  ET EXPLOIT MySQL Stack based buffer overrun Exploit Specific; [1
13,1212015/01/20 2015974  ET CURRENT_EVENTS Sibhost Status Check;  
13,1202015/01/20 2015973  ET CURRENT_EVENTS PHISH Gateway POST to gateway-p;  
13,1192015/01/20 2015972  ET CURRENT_EVENTS PHISH PayPal - Account Phished;  
13,1182015/01/20 2015971  ET CURRENT_EVENTS Zuponcic EK Java Exploit Jar;  
13,1172015/01/20 2015970  ET CURRENT_EVENTS Zuponcic EK Payload Request;  
13,1162015/01/20 2015969  ET TROJAN WORM_VOBFUS Requesting exe; [1
13,1152015/01/20 2015968  ET TROJAN WORM_VOBFUS Checkin 1; [1
13,1142015/01/20 2015967  ET P2P QVOD P2P Sharing Traffic detected (udp) payload;  
13,1132015/01/20 2015966  ET P2P QVOD P2P Sharing Traffic detected (udp) beacon;  
13,1122015/01/20 2015965  ET INFO EXE SCardForgetReaderGroupA (Used in Malware Anti-Debugging); [1
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.