시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,8612015/01/20 2014640  ET CURRENT_EVENTS Incognito Exploit Kit payload request to images.php?t=N;  
11,8602015/01/20 2014639  ET CURRENT_EVENTS Incognito Exploit Kit PDF request to images.php?t=81118;  
11,8592015/01/20 2014638  ET TROJAN Maljava Dropper for OS X; [1
11,8582015/01/20 2014637  ET TROJAN Maljava Dropper for Windows; [1
11,8572015/01/20 2014636  ET TROJAN Backdoor.Win32/Poison.BI;  
11,8562015/01/20 2014635  ET TROJAN Possible Variant.Kazy.53640 Malformed Client Hello SSL 3.0 (Cipher_Suite length greater than Client_Hello Length);  
11,8552015/01/20 2014634  ET TROJAN Possible Variant.Kazy.53640 Malformed Client Hello SSL 3.0 (Session_Id length greater than Client_Hello Length);  
11,8542015/01/20 2014633  ET WEB_SPECIFIC_APPS phpMyAdmin setup.php Remote File inclusion Attempt; [1,2
11,8532015/01/20 2014632  ET TROJAN FireEye.STX RAT Checkin; [1
11,8522015/01/20 2014631  ET DELETED FakeAV Security Shield payment page request;  
11,8512015/01/20 2014630  ET TROJAN PoisonIvy.Es11 Keepalive to CnC;  
11,8502015/01/20 2014629  ET DELETED Possible Blackhole Landing to 8 chr folder plus js.js;  
11,8492015/01/20 2014628  ET WEB_SPECIFIC_APPS DirectNews lib.panier.php Remote File inclusion Attempt; [1
11,8482015/01/20 2014627  ET WEB_SPECIFIC_APPS DirectNews menu_layers.php Remote File inclusion Attempt; [1
11,8472015/01/20 2014626  ET WEB_SPECIFIC_APPS DirectNews class.panier_article.php Remote File inclusion Attempt; [1
11,8462015/01/20 2014625  ET WEB_SPECIFIC_APPS DirectNews remote.php Remote File inclusion Attempt; [1
11,8452015/01/20 2014624  ET WEB_SPECIFIC_APPS DirectNews uploadBigFiles.php Remote File inclusion Attempt; [1
11,8442015/01/20 2014623  ET WEB_SPECIFIC_APPS DirectNews rootpath parameter Remote File inclusion Attempt; [1
11,8432015/01/20 2014622  ET WEB_SPECIFIC_APPS WordPress 1-jquery-photo-gallery-slideshow-flash plugin page Cross-Site Scripting Attempt; [1
11,8422015/01/20 2014621  ET WEB_SPECIFIC_APPS DokuWiki target parameter Cross-Site Scripting Attempt; [1
11,8412015/01/20 2014620  ET ACTIVEX Possible McAfee SaaS MyCioScan ShowReport Method Call Remote Command Execution 2; [1
11,8402015/01/20 2014619  ET ACTIVEX Possible McAfee SaaS MyCioScan ShowReport Method Call Remote Command Execution; [1
11,8392015/01/20 2014618  ET TROJAN W32/Sogu Remote Access Trojan Social Media Embedded CnC Channel; [1
11,8382015/01/20 2014617  ET POLICY Cisco IOS Self Signed Certificate Served to External Host;  
11,8372015/01/20 2014616  ET TROJAN Win32/Usteal.B Checkin; [1,2
11,8362015/01/20 2014615  ET CURRENT_EVENTS Jembot PHP Webshell (hell.php); [1
11,8352015/01/20 2014614  ET CURRENT_EVENTS Jembot PHP Webshell (system command); [1
11,8342015/01/20 2014613  ET CURRENT_EVENTS Jembot PHP Webshell (file upload); [1
11,8332015/01/20 2014612  ET CURRENT_EVENTS TDS Sutra - cookie is set RULEZ;  
11,8322015/01/20 2014611  ET CURRENT_EVENTS TDS Sutra - cookie set RULEZ;  
11,8312015/01/20 2014610  ET TROJAN W32/Downvision.A Initial Checkin; [1
11,8302015/01/20 2014609  ET CURRENT_EVENTS Incognito Exploit Kit Java request to images.php?t=;  
11,8292015/01/20 2014608  ET CURRENT_EVENTS Nikjju Mass Injection Internal WebServer Compromised;  
11,8282015/01/20 2014607  ET CURRENT_EVENTS Nikjju Mass Injection Compromised Site Served To Local Client;  
11,8272015/01/20 2014606  ET MALWARE W32/GameVance User-Agent (aw v3);  
11,8262015/01/20 2014605  ET MALWARE W32/GameVance Adware Server Reponse To Client Checkin;  
11,8252015/01/20 2014604  ET TROJAN Trojan.Win32.Yakes.pwo Checkin;  
11,8242015/01/20 2014601  ET TROJAN Win32/Nitol.B Checkin;  
11,8232015/01/20 2014600  ET TROJAN Win32/Nitol.A Checkin;  
11,8222015/01/20 2014599  ET TROJAN Mac Flashback Checkin 3;  
11,8212015/01/20 2014598  ET TROJAN Mac Flashback Checkin 2;  
11,8202015/01/20 2014597  ET TROJAN Mac Flashback Checkin 1;  
11,8192015/01/20 2014596  ET TROJAN FlashBack Mac OSX malware Checkin; [1
11,8182015/01/20 2014595  ET DELETED Win32 Jadtre/Wapomi/Nimnul/Viking.AY ICMP ping;  
11,8172015/01/20 2014594  ET ACTIVEX Possible Oracle Hyperion Financial Management TList6 ActiveX Control Remote Code Execution 2; [1
11,8162015/01/20 2014593  ET ACTIVEX Possible Oracle Hyperion Financial Management TList6 ActiveX Control Remote Code Execution; [1
11,8152015/01/20 2014592  ET WEB_SPECIFIC_APPS WordPress Facebook-Page-Promoter-Lightbox settings-updated Cross Site Scripting Attempt; [1
11,8142015/01/20 2014591  ET WEB_SPECIFIC_APPS Wordpress whois search domain Parameter Cross Site Scripting Attempt; [1
11,8132015/01/20 2014590  ET WEB_SPECIFIC_APPS Joomla com_pinboard option Parameter Remote File inclusion Attempt; [1
11,8122015/01/20 2014589  ET WEB_SPECIFIC_APPS Wordpress yousaytoo-auto-publishing plugin submit Cross-Site Scripting Attempt; [1
< 301  302  303  304  305  306  307  308  309  310 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.