시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,3112015/01/20 2009591  ET WEB_SPECIFIC_APPS Citrix XenCenterWeb console.php XSS attempt; [1,2
7,3102015/01/20 2009590  ET WEB_SPECIFIC_APPS Citrix XenCenterWeb edituser.php XSS attempt; [1,2
7,3092015/01/20 2009589  ET WEB_SPECIFIC_APPS Virtualmin Anonymous Proxy attempt; [1,2
7,3082015/01/20 2009588  ET WEB_SPECIFIC_APPS Virtualmin link.cgi XSS attempt; [1,2
7,3072015/01/20 2009587  ET WEB_SPECIFIC_APPS Virtualmin left.cgi XSS attempt; [1,2
7,3062015/01/20 2009586  ET DELETED Milw0rm Exploit Launch Attempt; [1,2
7,3052015/01/20 2009584  ET SCAN NMAP -sS window 4096; [1
7,3042015/01/20 2009583  ET SCAN NMAP -sS window 3072; [1
7,3032015/01/20 2009582  ET SCAN NMAP -sS window 1024; [1
7,3022015/01/20 2009581  ET ATTACK_RESPONSE Metasploit/Meterpreter - Sending metsrv.dll to Compromised Host; [1
7,3012015/01/20 2009580  ET ATTACK_RESPONSE Metasploit Meterpreter File Upload Detected; [1,2
7,3002015/01/20 2009579  ET ATTACK_RESPONSE Metasploit Meterpreter Registry Interation Detected; [1,2
7,2992015/01/20 2009578  ET ATTACK_RESPONSE Metasploit Meterpreter File/Memory Interaction Detected; [1,2
7,2982015/01/20 2009577  ET ATTACK_RESPONSE Metasploit Meterpreter Enabling/Disabling of Mouse Detected; [1,2
7,2972015/01/20 2009576  ET ATTACK_RESPONSE Metasploit Meterpreter Enabling/Disabling of Keyboard Detected; [1,2
7,2962015/01/20 2009575  ET ATTACK_RESPONSE Metasploit Meterpreter rev2self Command Detected; [1,2
7,2952015/01/20 2009574  ET ATTACK_RESPONSE Metasploit Meterpreter List (ls) Command Detected; [1,2
7,2942015/01/20 2009573  ET ATTACK_RESPONSE Metasploit Meterpreter Change Directory Command Detected; [1,2
7,2932015/01/20 2009572  ET ATTACK_RESPONSE Metasploit Meterpreter Remove Directory Command Detected; [1,2
7,2922015/01/20 2009571  ET ATTACK_RESPONSE Metasploit Meterpreter Make Directory Command Detected; [1,2
7,2912015/01/20 2009570  ET ATTACK_RESPONSE Metasploit Meterpreter System Get Idle Time Command Detected; [1,2
7,2902015/01/20 2009569  ET ATTACK_RESPONSE Metasploit Meterpreter System Reboot/Shutdown Detected; [1,2
7,2892015/01/20 2009568  ET ATTACK_RESPONSE Metasploit Meterpreter Execute Command Detected; [1,2
7,2882015/01/20 2009567  ET ATTACK_RESPONSE Metasploit Meterpreter View Current Process ID Command Detected; [1,2
7,2872015/01/20 2009566  ET ATTACK_RESPONSE Metasploit Meterpreter Print Working Directory Command Detected; [1,2
7,2862015/01/20 2009565  ET ATTACK_RESPONSE Metasploit Meterpreter Kill Process Command Detected; [1,2
7,2852015/01/20 2009564  ET ATTACK_RESPONSE Metasploit Meterpreter Route Command Detected; [1,2
7,2842015/01/20 2009563  ET ATTACK_RESPONSE Metasploit Meterpreter Sysinfo Command Detected; [1,2
7,2832015/01/20 2009562  ET ATTACK_RESPONSE Metasploit Meterpreter ipconfig Command Detected; [1,2
7,2822015/01/20 2009561  ET ATTACK_RESPONSE Metasploit Meterpreter Process Migration Detected; [1,2
7,2812015/01/20 2009560  ET ATTACK_RESPONSE Metasploit Meterpreter Getuid Command Detected; [1,2
7,2802015/01/20 2009559  ET ATTACK_RESPONSE Metasploit Meterpreter Process List (ps) Command Detected; [1,2
7,2792015/01/20 2009558  ET ATTACK_RESPONSE Metasploit Meterpreter File Download Detected; [1,2
7,2782015/01/20 2009557  ET TROJAN Yoda's Protector Packed Binary - VERY Likely Hostile; [1
7,2772015/01/20 2009555  ET SCAN Absinthe SQL Injection Tool HTTP Header Detected; [1,2
7,2762015/01/20 2009554  ET TROJAN FAKE/ROGUE AV/Security Application Checkin; [1
7,2752015/01/20 2009553  ET TROJAN FAKE/ROGUE AV Encoded data= HTTP POST; [1
7,2742015/01/20 2009550  ET TROJAN Banker PWS/Infostealer HTTP GET Checkin; [1,2
7,2732015/01/20 2009549  ET TROJAN Generic Downloader - HTTP POST; [1
7,2722015/01/20 2009548  ET DELETED Adware/Spyware Adrotator for Rogue AV; [1,2,3,4,5
7,2712015/01/20 2009547  ET TROJAN Suspicious User-Agent (Forthgoner) - Possible Trojan Downloader GET Request; [1
7,2702015/01/20 2009545  ET MALWARE User-Agent (_TEST_); [1
7,2692015/01/20 2009544  ET TROJAN Suspicious User-Agent (InHold) - Possible Trojan Downloader GET Request; [1
7,2682015/01/20 2009542  ET DELETED Silentbanker/Yaludle Checkin to C&C; [1
7,2672015/01/20 2009541  ET TROJAN Suspicious User-Agent filled with System Details - GET Request; [1
7,2662015/01/20 2009540  ET TROJAN PCFlashbang.com Spyware Checkin (PCFlashBangA); [1,2
7,2652015/01/20 2009539  ET TROJAN Downloader Infostealer - GET Checkin; [1
7,2642015/01/20 2009538  ET TROJAN Suspicious User-Agent (ms_ie) - Crypt.ZPACK Gen Trojan Downloader GET Request; [1
7,2632015/01/20 2009537  ET TROJAN Suspicious User-Agent (Loands) - Possible Trojan Downloader GET Request; [1
7,2622015/01/20 2009536  ET POLICY External FTP Connection TO Local HP JetDirect Printer; [1,2
< 391  392  393  394  395  396  397  398  399  400 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.