시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,0112015/01/20 2010386  ET SHELLCODE METASPLOIT BSD Bind shell (Countdown Encoded 3); [1
8,0102015/01/20 2010385  ET SHELLCODE METASPLOIT BSD Bind shell (Countdown Encoded 2); [1
8,0092015/01/20 2010383  ET SHELLCODE METASPLOIT BSD Bind shell; [1
8,0082015/01/20 2010382  ET TROJAN Fake AV GET; [1,2
8,0072015/01/20 2010381  ET TROJAN Syrutrk/Gibon/Bredolab Checkin; [1,2,3,4
8,0062015/01/20 2010380  ET WEB_SERVER JBOSS/JMX REMOTE WAR deployment attempt (GET); [1,2,3
8,0052015/01/20 2010379  ET WEB_SERVER JBOSS/JMX REMOTE WAR deployment attempt (POST); [1,2,3
8,0042015/01/20 2010378  ET POLICY JBOSS/JMX port 8080 access from outside; [1,2,3
8,0032015/01/20 2010377  ET POLICY JBOSS/JMX port 80 access from outside; [1,2,3
8,0022015/01/20 2010376  ET DELETED WU Malicious Spam Inbound; [1
8,0012015/01/20 2010375  ET EXPLOIT Possible Oracle Database Text Component ctxsys.drvxtabc.create_tables Remote SQL Injection Attempt; [1,2
8,0002015/01/20 2010374  ET ACTIVEX Haihaisoft Universal Player ActiveX Control URL Property Buffer Overflow Function Call Attempt; [1,2,3
7,9992015/01/20 2010373  ET ACTIVEX Haihaisoft Universal Player ActiveX Control URL Property Buffer Overflow Attempt; [1,2,3
7,9982015/01/20 2010372  ET SCAN Amap UDP Service Scan Detected; [1,2
7,9972015/01/20 2010371  ET SCAN Amap TCP Service Scan Detected; [1,2
7,9962015/01/20 2010370  ET ACTIVEX ACTIVEX Possible Symantec Altiris Deployment Solution and Notification Server ActiveX Control RunCmd Arbitrary Code Execution Function Call Attempt; [1,2,3
7,9952015/01/20 2010369  ET ACTIVEX Possible Symantec Altiris Deployment Solution and Notification Server ActiveX Control RunCmd Arbitrary Code Execution Attempt; [1,2,3
7,9942015/01/20 2010368  ET ACTIVEX Gom Player V 2.1.16 ActiveX Command Execution Function call attempt; [1,2
7,9932015/01/20 2010367  ET ACTIVEX Gom Player V 2.1.16 Activex Command Execution clsid access attempt; [1,2
7,9922015/01/20 2010366  ET ACTIVEX ProgramChecker 1.5 ActiveX Command Execution Function call attempt; [1,2
7,9912015/01/20 2010365  ET ACTIVEX ProgramChecker 1.5 Activex Command Execution clsid access attempt; [1,2
7,9902015/01/20 2010364  ET ACTIVEX Orca Browser 1.1 ActiveX Command Execution Function call attempt; [1,2
7,9892015/01/20 2010363  ET ACTIVEX Orca Browser 1.1 Activex Command Execution clsid access attempt; [1,2
7,9882015/01/20 2010362  ET WEB_SPECIFIC_APPS AjaxPortal di.php pathtoserverdata Parameter Remote File Inclusion Attempt; [1,2
7,9872015/01/20 2010361  ET WEB_SPECIFIC_APPS FSphp pathwirte.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3
7,9862015/01/20 2010360  ET WEB_SPECIFIC_APPS FSphp navigation.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3
7,9852015/01/20 2010359  ET WEB_SPECIFIC_APPS FSphp FSphp.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3
7,9842015/01/20 2010358  ET ACTIVEX Macrovision FLEXnet Connect ActiveX Control Arbitrary File Download; [1,2
7,9832015/01/20 2010357  ET ACTIVEX NCTAVIFile V 1.6.2 ActiveX File Creation Function call attempt; [1,2
7,9822015/01/20 2010356  ET ACTIVEX NCTAVIFile V 1.6.2 Activex File Creation clsid access attempt; [1,2
7,9812015/01/20 2010355  ET WEB_SPECIFIC_APPS OBOphiX fonctions_racine.php chemin_lib parameter Remote File Inclusion Attempt; [1,2,3
7,9802015/01/20 2010354  ET WEB_SPECIFIC_APPS Achievo debugger.php config_atkroot parameter Remote File Inclusion Attempt; [1
7,9792015/01/20 2010353  ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter UPDATE SET SQL Injection Attempt; [1,2
7,9782015/01/20 2010352  ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter INSERT INTO SQL Injection Attempt; [1,2
7,9772015/01/20 2010351  ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter UNION SELECT SQL Injection Attempt; [1,2
7,9762015/01/20 2010350  ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter DELETE FROM SQL Injection Attempt; [1,2
7,9752015/01/20 2010349  ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter SELECT FROM SQL Injection Attempt; [1,2
7,9742015/01/20 2010348  ET TROJAN - Possible Zeus/Perkesh (.bin) configuration download; [1,2
7,9732015/01/20 2010347  ET TROJAN Fake/Rogue AV Landing Page Encountered; [1,2
7,9722015/01/20 2010346  ET TROJAN Ultimate HAckerz Team User-Agent (Made by UltimateHackerzTeam) - Likely Trojan Report; [1
7,9712015/01/20 2010345  ET TROJAN Chorns/Poison Ivy related Backdoor Keep Alive; [1
7,9702015/01/20 2010344  ET TROJAN Chorns/Poison Ivy related Backdoor Initial Connection; [1
7,9692015/01/20 2010343  ET SCAN pangolin SQL injection tool; [1
7,9682015/01/20 2010342  ET DELETED NACHA/Zeus Phishing Executable Download Attempt; [1,2
7,9672015/01/20 2010341  ET WEB_SPECIFIC_APPS OS Commerce 2.2 RC2 Potential Anonymous Remote Code Execution; [1,2,3
7,9662015/01/20 2010339  ET DELETED Potential Fake Anti-Virus Download Inst_58s6.exe; [1,2
7,9652015/01/20 2010338  ET DELETED offers.e-centives.com Coupon Printer; [1,2
7,9642015/01/20 2010337  ET TROJAN FakeAV Reporting - POST often to resolution|borders.php; [1,2
7,9632015/01/20 2010334  ET TROJAN Dosenjo/Kvadr Proxy Trojan Activity; [1,2,3,4
7,9622015/01/20 2010333  ET MALWARE User-Agent (CrazyBro); [1,2,3,4,5
< 381  382  383  384  385  386  387  388  389  390 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.