시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,3112015/01/20 2008446  ET DNS Excessive DNS Responses with 1 or more RR's (100 in 10 seconds) - possible Cache Poisoning Attempt; [1
6,3102015/01/20 2008445  ET EXPLOIT Pwdump6 Session Established test file created on victim; [1,2
6,3092015/01/20 2008444  ET EXPLOIT PWDump4 Password dumping exe copied to victim; [1,2
6,3082015/01/20 2008443  ET TROJAN Coreflood/AFcore Trojan Infection (2); [1,2
6,3072015/01/20 2008442  ET TROJAN Rootkit.Win32.Clbd.cz Checkin; [1
6,3062015/01/20 2008441  ET TROJAN Win32 Dialer Variant; [1
6,3052015/01/20 2008440  ET TROJAN Suspicious User-Agent (Download App); [1
6,3042015/01/20 2008439  ET WEB_SPECIFIC_APPS AlstraSoft Affiliate Network Pro (pgm) Parameter SQL Injection; [1,2
6,3032015/01/20 2008438  ET MALWARE Possible Windows executable sent when remote host claims to send a Text File; [1
6,3022015/01/20 2008437  ET DELETED Win32.Testlink Trojan Checkin port 8888; [1
6,3012015/01/20 2008436  ET DELETED Win32.Testlink Trojan Speed Test port 8888; [1
6,3002015/01/20 2008435  ET DELETED Win32.Testlink Trojan Speed Test Start port 8888; [1
6,2992015/01/20 2008434  ET TROJAN Coreflood/AFcore Trojan Infection; [1,2
6,2982015/01/20 2008433  ET TROJAN Pandex checkin detected; [1
6,2972015/01/20 2008431  ET TROJAN PWS.Gamania Checkin; [1
6,2962015/01/20 2008430  ET TROJAN Win32.Dialer.buv Sending Information Home; [1
6,2952015/01/20 2008429  ET TROJAN Suspicious User-Agent (HttpDownload); [1
6,2942015/01/20 2008428  ET TROJAN Suspicious User-Agent (HTTP Downloader); [1
6,2932015/01/20 2008427  ET TROJAN Suspicious User-Agent (AdiseExplorer); [1
6,2922015/01/20 2008426  ET EXPLOIT SecurityGateway 1.0.1 Remote Buffer Overflow; [1,2,3
6,2912015/01/20 2008425  ET MALWARE Advert-network.com Related Spyware Checking for Updates; [1
6,2902015/01/20 2008424  ET TROJAN Suspicious User-Agent (CFS_DOWNLOAD); [1
6,2892015/01/20 2008423  ET TROJAN Suspicious User-Agent (CFS Agent); [1
6,2882015/01/20 2008422  ET TROJAN Suspicious User-Agent (Inet_read); [1
6,2872015/01/20 2008420  ET TROJAN HTTP GET Request on port 53 - Very Likely Hostile; [1
6,2862015/01/20 2008419  ET MALWARE Advert-network.com Related Spyware Updating; [1
6,2852015/01/20 2008418  ET POLICY Metasploit Framework Update; [1,2,3
6,2842015/01/20 2008417  ET SCAN Wapiti Web Server Vulnerability Scan; [1,2
6,2832015/01/20 2008416  ET SCAN Httprint Web Server Fingerprint Scan; [1,2,3
6,2822015/01/20 2008415  ET SCAN Cisco Torch IOS HTTP Scan; [1,2,3
6,2812015/01/20 2008414  ET SCAN Cisco Torch TFTP Scan; [1,2,3
6,2802015/01/20 2008413  ET TROJAN Suspicious User-Agent (PcPcUpdater); [1
6,2792015/01/20 2008412  ET TROJAN Trojan-Dropper.Win32.Small.avu HTTP Checkin; [1
6,2782015/01/20 2008411  ET TROJAN LDPinch SMTP Password Report with mail client The Bat!; [1
6,2772015/01/20 2008409  ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (3); [1,2,3
6,2762015/01/20 2008408  ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (2); [1,2,3
6,2752015/01/20 2008407  ET ACTIVEX Snapshot Viewer for Microsoft Access ActiveX Control Arbitrary File Download (1); [1,2,3
6,2742015/01/20 2008406  ET POLICY RemoteSpy.com Upload Detect; [1
6,2732015/01/20 2008405  ET TROJAN Obitel trojan calling home; [1,2
6,2722015/01/20 2008402  ET MALWARE Realtimegaming.com Online Casino Spyware Gaming Checkin; [1
6,2712015/01/20 2008400  ET TROJAN Suspicious User-Agent (ReadFileURL); [1
6,2702015/01/20 2008399  ET TROJAN contacy.info Trojan Checkin (User agent clk_jdfhid); [1
6,2692015/01/20 2008398  ET TROJAN Fullspace.cc or Related Checkin (2); [1
6,2682015/01/20 2008397  ET TROJAN Fullspace.cc or Related Checkin (1); [1
6,2672015/01/20 2008396  ET TROJAN Zlob Initial Check-in Version 2 (confirm.php?sid=); [1
6,2662015/01/20 2008395  ET TROJAN 3alupKo/Win32.Socks.n Related Checkin URL (3); [1
6,2652015/01/20 2008393  ET TROJAN 3alupKo/Win32.Socks.n Related Checkin URL (2); [1
6,2642015/01/20 2008391  ET TROJAN Suspicious User-Agent (svchost); [1
6,2632015/01/20 2008390  ET DELETED Hupigon Response from Controller (YES - ~~@@); [1,2
6,2622015/01/20 2008389  ET DELETED Likely Hupigon Post to Controller; [1,2
< 411  412  413  414  415  416  417  418  419  420 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.