시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,8612015/01/20 2011324  ET DELETED Games.jar Download Suspicious Possible Exploit Attempt;  
8,8602015/01/20 2011312  ET POLICY hide-my-ip.com POST version check;  
8,8592015/01/20 2011311  ET POLICY request for hide-my-ip.com autoupdate;  
8,8582015/01/20 2011307  ET DELETED DRIVEBY bredolab - hidden div served by nginx;  
8,8572015/01/20 2011306  ET DELETED MALVERTISING request to adfarm.mediaplex.com.* host;  
8,8562015/01/20 2011305  ET DELETED MALVERTISING request to adnet.media.* host;  
8,8552015/01/20 2011304  ET DELETED MALVERTISING request to view.ads.* host;  
8,8542015/01/20 2011303  ET DELETED MALVERTISING request to js.zedo.com.* host;  
8,8532015/01/20 2011302  ET DELETED MALVERTISING request to media.fastclick.net.* host;  
8,8522015/01/20 2011300  ET TROJAN Stuxnet index.php; [1
8,8512015/01/20 2011297  ET MALWARE User-Agent (KRMAK) Butterfly Bot download;  
8,8502015/01/20 2011296  ET TROJAN Butterfly/Mariposa Bot Join Acknowledgment;  
8,8492015/01/20 2011295  ET TROJAN Butterfly/Mariposa Bot client init connection;  
8,8482015/01/20 2011294  ET TROJAN Trojan.Win32.FraudPack.aweo; [1
8,8472015/01/20 2011293  ET MALWARE Suspicious User Agent (GabPath);  
8,8462015/01/20 2011291  ET WEB_SERVER Asprox Spambot SQL-Injection Atempt;  
8,8452015/01/20 2011290  ET WEB_SERVER Gootkit Website Infection Request for FTP Credentials from Control Server; [1,2,3
8,8442015/01/20 2011289  ET WEB_SERVER Local Website Infected By Gootkit; [1,2,3
8,8432015/01/20 2011287  ET WEB_SERVER Gootkit Website Infection Receiving FTP Credentials from Control Server; [1,2,3
8,8422015/01/20 2011286  ET WEB_SERVER Bot Search RFI Scan (Casper-Like MaMa Cyber/ebes); [1,2
8,8412015/01/20 2011285  ET WEB_SERVER Bot Search RFI Scan (Casper-Like, Jcomers Bot scan); [1,2
8,8402015/01/20 2011283  ET MALWARE User-Agent (TALWinInetHTTPClient);  
8,8392015/01/20 2011282  ET USER_AGENTS Suspicious User Agent (ScrapeBox);  
8,8382015/01/20 2011281  ET WEB_CLIENT phoenix exploit kit - admin login page detected;  
8,8372015/01/20 2011280  ET WEB_SERVER Phoenix Exploit Kit - Admin Login Page Detected Outbound;  
8,8362015/01/20 2011279  ET MALWARE User-Agent (browserbob.com);  
8,8352015/01/20 2011278  ET TROJAN Trojan.Win32.Cosmu.xet; [1
8,8342015/01/20 2011277  ET TROJAN Rogue.Win32/Winwebsec Checkin; [1
8,8332015/01/20 2011276  ET TROJAN Suspicious User-Agent (InfoBot); [1
8,8322015/01/20 2011275  ET DELETED Akamai Redswoosh CLIOnlineManager Connection Detected; [1
8,8312015/01/20 2011274  ET WEB_SPECIFIC_APPS OpenX phpAdsNew phpAds_geoPlugin Parameter Remote File Inclusion Attempt; [1,2,3
8,8302015/01/20 2011273  ET DELETED User-Agent (GM Login); [1
8,8292015/01/20 2011272  ET TROJAN Win32/Chekafe.A or Related Infection Checkin; [1,2
8,8282015/01/20 2011271  ET MALWARE User-Agent (CustomSpy); [1
8,8272015/01/20 2011270  ET DELETED Possible Microsoft Windows .lnk File Processing WebDAV Arbitrary Code Execution Attempt; [1,2,3
8,8262015/01/20 2011269  ET TROJAN Downloader.Win32.Small; [1
8,8252015/01/20 2011268  ET WEB_SPECIFIC_APPS Oracle Business Process Management context Parameter Cross Site Scripting Attempt; [1,2,3
8,8242015/01/20 2011266  ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter UPDATE SET SQL Injection Attempt; [1,2,3
8,8232015/01/20 2011265  ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter INSERT INTO SQL Injection Attempt; [1,2,3
8,8222015/01/20 2011264  ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter UNION SELECT SQL Injection Attempt; [1,2,3
8,8212015/01/20 2011263  ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter DELETE FROM SQL Injection Attempt; [1,2,3
8,8202015/01/20 2011262  ET WEB_SPECIFIC_APPS Group-Office comment_id Parameter SELECT FROM SQL Injection Attempt; [1,2,3
8,8192015/01/20 2011259  ET WEB_SPECIFIC_APPS MAXcms fm_includes_special Parameter Remote File Inclusion Attempt; [1,2,3
8,8182015/01/20 2011258  ET WEB_SPECIFIC_APPS FireStats window-new-edit-site.php Cross Site Scripting Attempt; [1,2,3
8,8172015/01/20 2011257  ET WEB_SPECIFIC_APPS FireStats window-add-excluded-url.php Cross Site Scripting Attempt; [1,2,3
8,8162015/01/20 2011256  ET WEB_SPECIFIC_APPS FireStats window-add-excluded-ip.php Cross Site Scripting Attempt; [1,2,3
8,8152015/01/20 2011255  ET WEB_SPECIFIC_APPS Redaxo CMS specials.inc.php Remote File Inclusion Attempt; [1,2,3
8,8142015/01/20 2011254  ET WEB_SPECIFIC_APPS Redaxo CMS index.inc.php Remote File Inclusion Attempt; [1,2,3
8,8132015/01/20 2011253  ET ACTIVEX Registry OCX ActiveX FullPath Method Buffer Overflow Attempt; [1,2
8,8122015/01/20 2011252  ET DELETED FathFTP ActiveX Control RasIsConnected Method Buffer Overflow Attempt; [1,2
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.