시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,4612015/01/20 2012108  ET WEB_CLIENT Hex Obfuscation of charCodeAt %u UTF-16 Encoding; [1,2
9,4602015/01/20 2012107  ET WEB_CLIENT Hex Obfuscation of document.write %u UTF-16 Encoding; [1,2
9,4592015/01/20 2012106  ET WEB_CLIENT Hex Obfuscation of arguments.callee %u UTF-16 Encoding; [1,2
9,4582015/01/20 2012105  ET MALWARE AdVantage Malware URL Infection Report; [1
9,4572015/01/20 2012104  ET MALWARE User-Agent (AdVantage); [1
9,4562015/01/20 2012103  ET EXPLOIT D-Link bsc_wlan.php Security Bypass; [1
9,4552015/01/20 2012102  ET ACTIVEX Image Viewer CP Gold Image2PDF Buffer Overflow; [1
9,4542015/01/20 2012101  ET EXPLOIT Oracle Virtual Server Agent Command Injection Attempt; [1
9,4532015/01/20 2012100  ET WEB_CLIENT Oracle Java 6 Object Tag launchjnlp docbase Parameters Buffer Overflow; [1
9,4522015/01/20 2012099  ET WEB_SPECIFIC_APPS Joomla Component Billy Portfolio catid Parameter Blind SQL Injection Attempt; [1
9,4512015/01/20 2012098  ET ACTIVEX J-Integra ActiveX SetIdentity Buffer Overflow; [1
9,4502015/01/20 2012097  ET ACTIVEX WMITools ActiveX Remote Code Execution; [1
9,4492015/01/20 2012096  ET SCADA DATAC RealWin SCADA Server Buffer Overflow; [1,2
9,4482015/01/20 2012095  ET ACTIVEX J-Integra Remote Code Execution; [1
9,4472015/01/20 2012094  ET NETBIOS SMB Trans2 Query_Fs_Attribute_Info SrvSmbQueryFsInformation Pool Buffer Overflow; [1,2,3
9,4462015/01/20 2012093  ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1
9,4452015/01/20 2012092  ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1
9,4442015/01/20 2012091  ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1
9,4432015/01/20 2012090  ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1
9,4422015/01/20 2012089  ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1
9,4412015/01/20 2012088  ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1
9,4402015/01/20 2012087  ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1
9,4392015/01/20 2012086  ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1
9,4382015/01/20 2012085  ET WEB_CLIENT Oracle Java 6 Object Tag launchjnlp docbase Parameters Flowbits Set;  
9,4372015/01/20 2012084  ET NETBIOS Microsoft Windows SMB Client Race Condition Remote Code Execution; [1,2
9,4362015/01/20 2012083  ET DELETED Possible Bozvanovna Zeus Campaign SSL Certificate; [1
9,4352015/01/20 2012082  ET DELETED Possible Bozvanovna Zeus Campaign Binary File URL; [1
9,4342015/01/20 2012081  ET DELETED Possible Bozvanovna Zeus Campaign Config File URL; [1
9,4332015/01/20 2012080  ET POLICY Windows-Based OpenSSL Tunnel Connection Outbound 3; [1
9,4322015/01/20 2012079  ET POLICY Windows-Based OpenSSL Tunnel Connection Outbound 2; [1
9,4312015/01/20 2012078  ET POLICY Windows-Based OpenSSL Tunnel Outbound; [1
9,4302015/01/20 2012077  ET SCAN Goatzapszu Header from unknown Scanning Tool;  
9,4292015/01/20 2012076  ET TROJAN Win32.Krap.ar Infection URL Request; [1
9,4282015/01/20 2012075  ET WEB_CLIENT Possible Internet Explorer CSS Parser Remote Code Execution Attempt; [1,2,3,4,5
9,4272015/01/20 2012074  ET WEB_SPECIFIC_APPS Aigaion ID Parameter DELETE FROM SQL Injection Attempt; [1,2
9,4262015/01/20 2012073  ET WEB_SPECIFIC_APPS Aigaion ID Parameter SELECT FROM SQL Injection Attempt; [1,2
9,4252015/01/20 2012072  ET WEB_SPECIFIC_APPS WordPress Safe Search Plugin v1 Parameter Cross Site Scripting Attempt; [1
9,4242015/01/20 2012071  ET WEB_SPECIFIC_APPS Google Urchin session.cgi Local File Inclusion Attempt; [1
9,4232015/01/20 2012070  ET WEB_SPECIFIC_APPS MantisBT db_type Parameter Cross Site Scripting Attempt; [1,2
9,4222015/01/20 2012069  ET WEB_SPECIFIC_APPS MantisBT db_type Parameter Local File Inclusion Attempt; [1,2
9,4212015/01/20 2012068  ET WEB_SPECIFIC_APPS Profi Einzelgebots Auktions System auktion_text.php Blind SQL Injection Attempt; [1
9,4202015/01/20 2012066  ET WEB_SPECIFIC_APPS Aigaion ID Parameter INSERT INTO SQL Injection Attempt; [1,2
9,4192015/01/20 2012065  ET WEB_SPECIFIC_APPS Aigaion ID Parameter UNION SELECT SQL Injection Attempt; [1,2
9,4182015/01/20 2012064  ET WEB_CLIENT Foxit PDF Reader Title Stack Overflow; [1
9,4172015/01/20 2012063  ET NETBIOS Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference; [1,2
9,4162015/01/20 2012062  ET WEB_CLIENT Hex Obfuscation of arguments.callee %u UTF-8 Encoding; [1,2
9,4152015/01/20 2012061  ET WEB_CLIENT Hex Obfuscation of arguments.callee % Encoding; [1,2
9,4142015/01/20 2012060  ET WEB_CLIENT Hex Obfuscation of document.write %u UTF-8 Encoding; [1,2
9,4132015/01/20 2012059  ET WEB_CLIENT Hex Obfuscation of document.write % Encoding; [1,2
9,4122015/01/20 2012058  ET EXPLOIT HP LaserJet PLJ Interface Directory Traversal; [1
< 351  352  353  354  355  356  357  358  359  360 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.