시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,1112015/01/20 2011720  ET SCAN Possible WafWoof Web Application Firewall Detection Scan; [1,2
9,1102015/01/20 2011719  ET POLICY Win32/Sogou User-Agent (SOGOU_UPDATER); [1,2
9,1092015/01/20 2011718  ET MALWARE User-Agent (RangeCheck/0.1); [1
9,1082015/01/20 2011716  ET SCAN Sipvicious User-Agent Detected (friendly-scanner); [1,2,3
9,1072015/01/20 2011715  ET DELETED MALVERTISING Adobe Exploited Check-In; [1
9,1062015/01/20 2011714  ET DELETED Hidden iframe Served by nginx - Likely Hostile Code; [1
9,1052015/01/20 2011713  ET P2P Bittorrent P2P Client User-Agent (BTSP); [1
9,1042015/01/20 2011712  ET P2P Bittorrent P2P Client User-Agent (FDM 3.x); [1,2
9,1032015/01/20 2011711  ET P2P Bittorrent P2P Client User-Agent (KTorrent 2.x); [1,2
9,1022015/01/20 2011710  ET P2P Bittorrent P2P Client User-Agent (BitComet); [1,2
9,1012015/01/20 2011708  ET GAMES Blizzard Downloader Client User-Agent (Blizzard Downloader 2.x); [1,2
9,1002015/01/20 2011707  ET P2P Client User-Agent (Shareaza 2.x); [1,2
9,0992015/01/20 2011706  ET P2P Bittorrent P2P Client User-Agent (uTorrent); [1,2
9,0982015/01/20 2011705  ET P2P Bittorrent P2P Client User-Agent (rTorrent); [1,2
9,0972015/01/20 2011704  ET P2P Bittorrent P2P Client User-Agent (Deluge 1.x.x); [1,2
9,0962015/01/20 2011703  ET P2P Bittorrent P2P Client User-Agent (Enhanced CTorrent 3.x); [1,2
9,0952015/01/20 2011702  ET P2P Bittorrent P2P Client User-Agent (BitTornado); [1,2
9,0942015/01/20 2011701  ET P2P Bittorrent P2P Client User-Agent (Opera/10.x); [1,2
9,0932015/01/20 2011700  ET P2P Bittorrent P2P Client User-Agent (KTorrent/3.x.x); [1,2
9,0922015/01/20 2011699  ET P2P Bittorrent P2P Client User-Agent (Transmission/1.x); [1,2
9,0912015/01/20 2011698  ET WEB_CLIENT Java Web Start Command Injection (.jar); [1,2
9,0902015/01/20 2011697  ET WEB_SPECIFIC_APPS JBoss JMX Console Beanshell Deployer .WAR File Upload and Deployment Cross Site Request Forgery Attempt; [1,2
9,0892015/01/20 2011696  ET WEB_SPECIFIC_APPS Possible JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Exploit Attempt; [1,2
9,0882015/01/20 2011695  ET WEB_CLIENT Possible Microsoft Internet Explorer Dynamic Object Tag/URLMON Sniffing Cross Domain Information Disclosure Attempt; [1,2,3,4,5
9,0872015/01/20 2011694  ET POLICY Windows 3.1 User-Agent Detected - Possible Malware or Non-Updated System; [1
9,0862015/01/20 2011693  ET TROJAN Fragus Exploit Kit Landing; [1,2,3
9,0852015/01/20 2011692  ET ACTIVEX Avaya CallPilot Unified Messaging ActiveX InstallFrom Method Access Attempt; [1,2
9,0842015/01/20 2011691  ET MALWARE Hotbar Agent User-Agent (PinballCorp); [1
9,0832015/01/20 2011690  ET ACTIVEX Possible Sygate Personal Firewall ActiveX SetRegString Method Stack Overflow Attempt; [1,2,3
9,0822015/01/20 2011681  ET ACTIVEX Avaya CallPilot Unified Messaging ActiveX Function Call; [1,2
9,0812015/01/20 2011680  ET DELETED Skype Easybits Extras Manager - Exploit; [1,2
9,0802015/01/20 2011679  ET MALWARE User-Agent (dbcount); [1
9,0792015/01/20 2011678  ET MALWARE User-Agent (HTTP_Query); [1
9,0782015/01/20 2011677  ET MALWARE MSIL.Amiricil.gen HTTP Checkin; [1,2
9,0772015/01/20 2011676  ET WEB_SPECIFIC_APPS Cisco Collaboration Server LoginPage.jhtml Cross Site Scripting Attempt; [1,2
9,0762015/01/20 2011675  ET ACTIVEX Possible NOS Microsystems Adobe Reader/Acrobat getPlus Get_atlcom Helper ActiveX Control Multiple Stack Overflows Remote Code Execution Attempt; [1,2,3,4,5
9,0752015/01/20 2011674  ET DOS SolarWinds TFTP Server Long Write Request Denial Of Service Attempt; [1,2
9,0742015/01/20 2011673  ET DOS Possible SolarWinds TFTP Server Read Request Denial Of Service Attempt; [1,2
9,0732015/01/20 2011672  ET DELETED Adobe Flash 0Day Exploit Attempt; [1,2
9,0722015/01/20 2011670  ET DELETED Fake AV Related CSS Download; [1
9,0712015/01/20 2011669  ET EXPLOIT Linksys WAP54G debug.cgi Shell Access as Gemtek; [1,2
9,0702015/01/20 2011668  ET ATTACK_RESPONSE Backdoor reDuh http tunnel; [1,2
9,0692015/01/20 2011667  ET ATTACK_RESPONSE Backdoor reDuh http initiate; [1,2
9,0682015/01/20 2011666  ET WEB_SPECIFIC_APPS 29o3 CMS layoutManager.php LibDir Parameter Remote File Inclusion Attempt; [1,2
9,0672015/01/20 2011592  ET TROJAN Yoyo-DDoS Bot Download and Launch Executable Message From CnC Server; [1
9,0662015/01/20 2011591  ET TROJAN Potential-Hiloti/FakeAV site access;  
9,0652015/01/20 2011590  ET ACTIVEX Microsoft DirectX 9 ActiveX Control Format String Function Call; [1
9,0642015/01/20 2011589  ET ACTIVEX Microsoft DirectX 9 msvidctl.dll ActiveX Control Code Execution Attempt; [1
9,0632015/01/20 2011588  ET TROJAN Zeus Bot Request to CnC; [1,2
9,0622015/01/20 2011585  ET TROJAN Avzhan DDOS Bot Outbound Hardcoded Malformed GET Request Denial Of Service Attack Detected; [1
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.