시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,8112015/01/20 2011251  ET ACTIVEX FathFTP ActiveX Control GetFromURL Method Buffer Overflow Attempt; [1,2
8,8102015/01/20 2011250  ET ACTIVEX Image22 ActiveX DrawIcon Method Buffer Overflow Attempt; [1,2
8,8092015/01/20 2011249  ET ACTIVEX RSP MP3 Player OCX ActiveX OpenFile Method Buffer Overflow Attempt; [1,2,3
8,8082015/01/20 2011248  ET MALWARE User-Agent (XieHongWei-HttpDown/2.0); [1
8,8072015/01/20 2011247  ET MALWARE Likely Hostile User-Agent (Forthgoer); [1
8,8062015/01/20 2011246  ET WEB_CLIENT Likely Malicious PDF Containing StrReverse; [1
8,8052015/01/20 2011245  ET WEB_CLIENT PDF Containing Windows Commands Downloaded; [1
8,8042015/01/20 2011244  ET WEB_SERVER Bot Search RFI Scan (ByroeNet/Casper-Like sun4u); [1,2
8,8032015/01/20 2011243  ET WEB_SERVER Bot Search RFI Scan (ByroeNet/Casper-Like, planetwork); [1,2
8,8022015/01/20 2011242  ET EXPLOIT Possible VLC Media Player M3U File FTP URL Processing Stack Buffer Overflow Attempt; [1,2
8,8012015/01/20 2011241  ET EXPLOIT M3U File Request Flowbit Set; [1
8,8002015/01/20 2011240  ET WEB_CLIENT Mozilla Firefox Window.Open Document URI Spoofing Attempt; [1,2,3
8,7992015/01/20 2011239  ET DELETED Possible Microsoft Windows Shortcut LNK File Automatic File Execution Attempt Via WebDAV; [1,2,3,4
8,7982015/01/20 2011238  ET MALWARE User-Agent (Mozilla/4.0 (SP3 WINLD)); [1
8,7972015/01/20 2011236  ET TROJAN Trojan-Downloader Win32.Genome.avan; [1
8,7962015/01/20 2011235  ET EXPLOIT Possible Novell Groupwise Internet Agent CREATE Verb Stack Overflow Attempt; [1,2,3,4
8,7952015/01/20 2011234  ET TROJAN Cosmu Process Dump Report; [1
8,7942015/01/20 2011233  ET DELETED Troxen GetSpeed Request; [1,2
8,7932015/01/20 2011232  ET P2P p2p Related User-Agent (eChanblard); [1
8,7922015/01/20 2011231  ET DELETED MALVERTISING client requesting redirect to drive by - .php?c=cust; [1
8,7912015/01/20 2011230  ET DELETED MALVERTISING client requesting drive by - /x/?src=; [1
8,7902015/01/20 2011229  ET MALWARE User-Agent (Suggestion); [1
8,7892015/01/20 2011228  ET DELETED Trojan.StartPage activity; [1
8,7882015/01/20 2011227  ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers; [1
8,7872015/01/20 2011226  ET MALWARE Sogou Toolbar Checkin; [1
8,7862015/01/20 2011225  ET POLICY Suspicious User Agent (AskInstallChecker); [1
8,7852015/01/20 2011224  ET DELETED Malvertising drive by kit collecting browser info; [1
8,7842015/01/20 2011223  ET CURRENT_EVENTS Malvertising drive by kit encountered - Loading...; [1
8,7832015/01/20 2011222  ET DELETED Malvertising drive by kit encountered - bmb cookie; [1
8,7822015/01/20 2011221  ET DELETED FakeAV Served To Client; [1
8,7812015/01/20 2011220  ET DELETED Executable requested from /wp-content/languages; [1,2
8,7802015/01/20 2011219  ET WEB_SPECIFIC_APPS Campsite article_id Parameter UPDATE SET SQL Injection Attempt; [1,2
8,7792015/01/20 2011218  ET WEB_SPECIFIC_APPS Campsite article_id Parameter INSERT INTO SQL Injection Attempt; [1,2
8,7782015/01/20 2011217  ET WEB_SPECIFIC_APPS Campsite article_id Parameter UNION SELECT SQL Injection Attempt; [1,2
8,7772015/01/20 2011216  ET WEB_SPECIFIC_APPS Campsite article_id Parameter DELETE FROM SQL Injection Attempt; [1,2
8,7762015/01/20 2011215  ET WEB_SPECIFIC_APPS Campsite article_id Parameter SELECT FROM SQL Injection Attempt; [1,2
8,7752015/01/20 2011214  ET WEB_SPECIFIC_APPS ArdeaCore pathForArdeaCore Parameter Remote File Inclusion Attempt; [1,2,3
8,7742015/01/20 2011213  ET ACTIVEX Consona Products SdcUser.TgConCtl ActiveX Control BOF Function Call; [1,2,3
8,7732015/01/20 2011212  ET ACTIVEX Consona Products SdcUser.TgConCtl ActiveX Control Buffer Overflow Attempt; [1,2,3
8,7722015/01/20 2011211  ET ACTIVEX AtHocGov IWSAlerts ActiveX Control Buffer Overflow Function Call Attempt; [1,2,3
8,7712015/01/20 2011210  ET ACTIVEX ComponentOne VSFlexGrid ActiveX Control Archive Method Buffer Overflow Attempt; [1,2
8,7702015/01/20 2011209  ET WEB_SPECIFIC_APPS ClearSite device_admin.php cs_base_path Parameter Remote File Inclusion Attempt; [1,2
8,7692015/01/20 2011208  ET WEB_SPECIFIC_APPS SaschArt SasCam Webcam Server ActiveX Buffer Overflow Function Call; [1,2
8,7682015/01/20 2011207  ET ACTIVEX SaschArt SasCam Webcam Server ActiveX Control Head Method Buffer Overflow Attempt; [1,2
8,7672015/01/20 2011206  ET ACTIVEX AVTECH Software ActiveX Buffer Overflow Function Call; [1,2,3
8,7662015/01/20 2011205  ET ACTIVEX AVTECH Software ActiveX _DownloadPBControl Method Buffer Overflow Attempt; [1,2,3
8,7652015/01/20 2011204  ET ACTIVEX AVTECH Software ActiveX _DownloadPBClose Method Buffer Overflow Attempt; [1,2,3
8,7642015/01/20 2011203  ET ACTIVEX AVTECH Software ActiveX _DownloadPBOpen Method Buffer Overflow Attempt; [1,2,3
8,7632015/01/20 2011202  ET ACTIVEX AVTECH Software ActiveX Snapshot Method Buffer Overflow Attempt; [1,2,3
8,7622015/01/20 2011201  ET ACTIVEX AVTECH Software ActiveX Login Method Buffer Oveflow Attempt; [1,2,3
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.