시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,9612015/01/20 2016836  ET WEB_SERVER ColdFusion password.properties access; [1
13,9602015/01/20 2016835  ET EXPLOIT Exim/Dovecot Possible MAIL FROM Command Execution; [1
13,9592015/01/20 2016834  ET DELETED Unknown Trojan POST;  
13,9582015/01/20 2016833  ET CURRENT_EVENTS IE HTML TIME ANIMATECOLOR with eval as seen in unknown EK; [1
13,9572015/01/20 2016832  ET CURRENT_EVENTS HellSpawn EK Requesting Jar;  
13,9562015/01/20 2016831  ET CURRENT_EVENTS CVE-2013-2423 IVKM PoC Seen in Unknown EK; [1
13,9552015/01/20 2016830  ET CURRENT_EVENTS Injection - var j=0;  
13,9542015/01/20 2016829  ET TROJAN Unknown Checkin;  
13,9532015/01/20 2016828  ET CURRENT_EVENTS Unknown EK Requsting Payload;  
13,9522015/01/20 2016827  ET INFO Suspicious Possible CollectGarbage in base64 3;  
13,9512015/01/20 2016826  ET INFO Suspicious Possible CollectGarbage in base64 2;  
13,9502015/01/20 2016825  ET INFO Suspicious Possible CollectGarbage in base64 1;  
13,9492015/01/20 2016824  ET EXPLOIT Metasploit mstime_malloc no-spray; [1
13,9482015/01/20 2016823  ET TROJAN Suspicious Fake Opera 10 User-Agent; [1,2
13,9472015/01/20 2016822  ET WEB_CLIENT Possible CVE-2013-1347 IE 0-day used in DOL attack; [1,2
13,9462015/01/20 2016821  ET TROJAN DEEP PANDA Checkin 3; [1,2
13,9452015/01/20 2016820  ET TROJAN DEEP PANDA Checkin 2; [1,2
13,9442015/01/20 2016819  ET TROJAN DEEP PANDA Checkin 1; [1,2
13,9432015/01/20 2016818  ET CURRENT_EVENTS Possible Java Applet JNLP applet_ssv_validated in Base64 3; [1
13,9422015/01/20 2016817  ET CURRENT_EVENTS Possible Java Applet JNLP applet_ssv_validated in Base64 2; [1
13,9412015/01/20 2016816  ET TROJAN Variant.Zusy.45802 Checkin;  
13,9402015/01/20 2016815  ET TROJAN Linux Backdoor Linux/Cdorked.A Redirect 3; [1
13,9392015/01/20 2016814  ET TROJAN Linux Backdoor Linux/Cdorked.A Redirect 2; [1
13,9382015/01/20 2016813  ET CURRENT_EVENTS - Possible BlackHole request with decryption Base;  
13,9372015/01/20 2016812  ET TROJAN Greencat SSL Certificate;  
13,9362015/01/20 2016811  ET CURRENT_EVENTS - Possible Redkit 1-4 char JNLP request;  
13,9352015/01/20 2016810  ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (2); [1
13,9342015/01/20 2016809  ET TROJAN Win32/Urausy.C Checkin 3;  
13,9332015/01/20 2016808  ET TROJAN Cookies/Cookiebag Checkin;  
13,9322015/01/20 2016807  ET CURRENT_EVENTS Eval With Base64.decode seen in DOL Watering Hole Attack 05/01/13;  
13,9312015/01/20 2016806  ET CURRENT_EVENTS Tor2Web .onion Proxy Service SSL Cert (1); [1
13,9302015/01/20 2016805  ET CURRENT_EVENTS Unknown EK UAC Disable in Uncompressed JAR;  
13,9292015/01/20 2016804  ET CURRENT_EVENTS Unknown_MM - Java Exploit - jreg.jar;  
13,9282015/01/20 2016803  ET TROJAN Known Sinkhole Response Header;  
13,9272015/01/20 2016802  ET INFO myobfuscate.com Encoded Script Calling home;  
13,9262015/01/20 2016801  ET CURRENT_EVENTS Nuclear landing with obfuscated plugindetect Apr 29 2013;  
13,9252015/01/20 2016800  ET TROJAN Medfos Connectivity Check;  
13,9242015/01/20 2016799  ET CURRENT_EVENTS Magnitude EK (formerly Popads) Flash Exploit Requested;  
13,9232015/01/20 2016798  ET CURRENT_EVENTS Magnitude EK (formerly Popads) Java JNLP Requested;  
13,9222015/01/20 2016797  ET CURRENT_EVENTS Possible Java Applet JNLP applet_ssv_validated Click To Run Bypass; [1
13,9212015/01/20 2016796  ET CURRENT_EVENTS Possible Java Applet JNLP applet_ssv_validated in Base64; [1
13,9202015/01/20 2016795  ET TROJAN ET TROJAN TROJ_NAIKON.A SSL Cert; [1
13,9192015/01/20 2016794  ET CURRENT_EVENTS Possible Linux/Cdorked.A Incoming Command; [1,2
13,9182015/01/20 2016793  ET TROJAN Linux Backdoor Linux/Cdorked.A Redirect 1; [1
13,9172015/01/20 2016792  ET WEB_SERVER Plesk Panel Possible HTTP_AUTH_LOGIN SQLi CVE-2012-1557;  
13,9162015/01/20 2016791  ET CURRENT_EVENTS Sakura - Landing Page - Received;  
13,9152015/01/20 2016790  ET CURRENT_EVENTS Possible Wordpress Super Cache Plugin PHP Injection dynamic-cached-content;  
13,9142015/01/20 2016789  ET CURRENT_EVENTS Possible Wordpress Super Cache Plugin PHP Injection mclude;  
13,9132015/01/20 2016788  ET CURRENT_EVENTS Possible Wordpress Super Cache Plugin PHP Injection mfunc;  
13,9122015/01/20 2016787  ET CURRENT_EVENTS Sakura - Payload Downloaded;  
< 261  262  263  264  265  266  267  268  269  270 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.