시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,8112015/01/20 2009037  ET DELETED Vipdataend C&C Traffic - Checkin (variant 3); [1
6,8102015/01/20 2009036  ET DELETED Armitage Loader Check-in; [1
6,8092015/01/20 2009035  ET POLICY Suspicious Executable (PE offset 512); [1
6,8082015/01/20 2009034  ET POLICY Suspicious Executable (PE offset 160); [1
6,8072015/01/20 2009033  ET POLICY Suspicious Executable (Win exe under 128); [1
6,8062015/01/20 2009032  ET DELETED Armitage Exploit Request; [1
6,8052015/01/20 2009029  ET WEB_SERVER SQL Injection Attempt (Agent NV32ts); [1
6,8042015/01/20 2009028  ET MALWARE 404 Response with an EXE Attached - Likely Malware Drop; [1
6,8032015/01/20 2009027  ET MALWARE User-Agent (FileDownloader); [1
6,8022015/01/20 2009026  ET TROJAN Vipdataend C&C Traffic - Status OK (variant 2); [1
6,8012015/01/20 2009025  ET TROJAN Vipdataend C&C Traffic Checkin variant 2; [1
6,8002015/01/20 2009024  ET TROJAN Downadup/Conficker A or B Worm reporting; [1,2
6,7992015/01/20 2009022  ET TROJAN Zlob User Agent (securityinternet); [1,2
6,7982015/01/20 2009021  ET MALWARE User-Agent (IE_6.0); [1
6,7972015/01/20 2009020  ET POLICY Internal Host Retrieving External IP via ipchicken.com - Possible Infection; [1
6,7962015/01/20 2009019  ET TROJAN VMProtect Demo version Packed Binary - Likely Hostile; [1,2,3
6,7952015/01/20 2009018  ET WEB_SPECIFIC_APPS Text Lines Rearrange Script filename parameter File Disclosure; [1,2,3
6,7942015/01/20 2009017  ET WEB_SPECIFIC_APPS WebPhotoPro rubrika.php idr Parameter SQL Injection; [1,2
6,7932015/01/20 2009016  ET WEB_SPECIFIC_APPS WebPhotoPro galeri_info.php lang Parameter SQL Injection; [1,2
6,7922015/01/20 2009015  ET WEB_SPECIFIC_APPS WebPhotoPro galeri_info.php ida Parameter SQL Injection; [1,2
6,7912015/01/20 2009014  ET WEB_SPECIFIC_APPS WebPhotoPro rub.php idr Parameter SQL Injection; [1,2
6,7902015/01/20 2009013  ET WEB_SPECIFIC_APPS WebPhotoPro art.php idm Parameter SQL Injection; [1,2
6,7892015/01/20 2009012  ET WEB_SPECIFIC_APPS Rematic CMS produkte.php id parameter SQL Injection; [1,2,3
6,7882015/01/20 2009011  ET WEB_SPECIFIC_APPS Rematic CMS referenzdetail.php id parameter SQL Injection; [1,2,3
6,7872015/01/20 2009010  ET WEB_SPECIFIC_APPS Wordpress Plugin Page Flip Image Gallery getConfig.php book_id parameter Remote File Disclosure; [1,2
6,7862015/01/20 2009009  ET WEB_SPECIFIC_APPS ClaSS export.php ftype parameter Information Disclosure; [1,2
6,7852015/01/20 2009005  ET MALWARE Simbar Spyware User-Agent Detected; [1,2,3
6,7842015/01/20 2009004  ET POLICY Login Credentials Possibly Passed in POST Data; [1
6,7832015/01/20 2009003  ET TROJAN Win32/Korklic.A; [1
6,7822015/01/20 2009002  ET ACTIVEX Phoenician Casino FlashAX ActiveX Control Remote Buffer Overflow; [1,2
6,7812015/01/20 2009001  ET POLICY Login Credentials Possibly Passed in URI; [1
6,7802015/01/20 2009000  ET WEB_SPECIFIC_APPS RSS Simple News news.php pid parameter Remote SQL Injection; [1,2
6,7792015/01/20 2008999  ET ACTIVEX EvansFTP EvansFTP.ocx Remote Buffer Overflow; [1,2
6,7782015/01/20 2008998  ET WEB_SPECIFIC_APPS EvimGibi Pro Resim Galerisi kat_id parameter SQL Injection; [1,2,3
6,7772015/01/20 2008997  ET WEB_SPECIFIC_APPS icash Click&BaneX user_menu.asp ID parameter SQL Injection; [1,2
6,7762015/01/20 2008996  ET WEB_SPECIFIC_APPS Simple Text-File Login script slogin_path parameter remote file inclusion; [1,2
6,7752015/01/20 2008995  ET WEB_SPECIFIC_APPS CF_Calendar calid parameter SQL Injection; [1,2,3
6,7742015/01/20 2008994  ET WEB_SPECIFIC_APPS Multiple Membership Script id parameter SQL injection; [1,2,3
6,7732015/01/20 2008993  ET ACTIVEX Microsoft Visual Basic Common AVI ActiveX Control File Parsing Buffer Overflow; [1,2
6,7722015/01/20 2008992  ET WEB_SPECIFIC_APPS phpAddEdit editform parameter Local File Inclusion; [1,2
6,7712015/01/20 2008989  ET POLICY Internal Host Retrieving External IP via showmyip.com - Possible Infection; [1
6,7702015/01/20 2008988  ET POLICY Internal Host Retrieving External IP via cmyip.com - Possible Infection; [1
6,7692015/01/20 2008987  ET POLICY Internal Host Retrieving External IP via showip.net - Possible Infection; [1
6,7682015/01/20 2008986  ET POLICY Internal Host Retrieving External IP via whatismyip.com - Possible Infection;  
6,7672015/01/20 2008985  ET POLICY Internal Host Retrieving External IP via whatismyip.com Automation Page - Possible Infection; [1
6,7662015/01/20 2008984  ET TROJAN Trojan-GameThief.Win32.OnLineGames infection report; [1
6,7652015/01/20 2008983  ET USER_AGENTS Suspicious User Agent (BlackSun); [1,2
6,7642015/01/20 2008977  ET TROJAN Vundo Variant reporting to Controller via HTTP (2); [1
6,7632015/01/20 2008976  ET TROJAN Vundo Variant reporting to Controller via HTTP (1); [1
6,7622015/01/20 2008975  ET TROJAN Suspicious Malformed Double Accept Header; [1
< 401  402  403  404  405  406  407  408  409  410 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.