|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 7,311 | 2015/01/20 | 2009591 | ET WEB_SPECIFIC_APPS Citrix XenCenterWeb console.php XSS attempt; [1,2] | 7,310 | 2015/01/20 | 2009590 | ET WEB_SPECIFIC_APPS Citrix XenCenterWeb edituser.php XSS attempt; [1,2] | 7,309 | 2015/01/20 | 2009589 | ET WEB_SPECIFIC_APPS Virtualmin Anonymous Proxy attempt; [1,2] | 7,308 | 2015/01/20 | 2009588 | ET WEB_SPECIFIC_APPS Virtualmin link.cgi XSS attempt; [1,2] | 7,307 | 2015/01/20 | 2009587 | ET WEB_SPECIFIC_APPS Virtualmin left.cgi XSS attempt; [1,2] | 7,306 | 2015/01/20 | 2009586 | ET DELETED Milw0rm Exploit Launch Attempt; [1,2] | 7,305 | 2015/01/20 | 2009584 | ET SCAN NMAP -sS window 4096; [1] | 7,304 | 2015/01/20 | 2009583 | ET SCAN NMAP -sS window 3072; [1] | 7,303 | 2015/01/20 | 2009582 | ET SCAN NMAP -sS window 1024; [1] | 7,302 | 2015/01/20 | 2009581 | ET ATTACK_RESPONSE Metasploit/Meterpreter - Sending metsrv.dll to Compromised Host; [1] | 7,301 | 2015/01/20 | 2009580 | ET ATTACK_RESPONSE Metasploit Meterpreter File Upload Detected; [1,2] | 7,300 | 2015/01/20 | 2009579 | ET ATTACK_RESPONSE Metasploit Meterpreter Registry Interation Detected; [1,2] | 7,299 | 2015/01/20 | 2009578 | ET ATTACK_RESPONSE Metasploit Meterpreter File/Memory Interaction Detected; [1,2] | 7,298 | 2015/01/20 | 2009577 | ET ATTACK_RESPONSE Metasploit Meterpreter Enabling/Disabling of Mouse Detected; [1,2] | 7,297 | 2015/01/20 | 2009576 | ET ATTACK_RESPONSE Metasploit Meterpreter Enabling/Disabling of Keyboard Detected; [1,2] | 7,296 | 2015/01/20 | 2009575 | ET ATTACK_RESPONSE Metasploit Meterpreter rev2self Command Detected; [1,2] | 7,295 | 2015/01/20 | 2009574 | ET ATTACK_RESPONSE Metasploit Meterpreter List (ls) Command Detected; [1,2] | 7,294 | 2015/01/20 | 2009573 | ET ATTACK_RESPONSE Metasploit Meterpreter Change Directory Command Detected; [1,2] | 7,293 | 2015/01/20 | 2009572 | ET ATTACK_RESPONSE Metasploit Meterpreter Remove Directory Command Detected; [1,2] | 7,292 | 2015/01/20 | 2009571 | ET ATTACK_RESPONSE Metasploit Meterpreter Make Directory Command Detected; [1,2] | 7,291 | 2015/01/20 | 2009570 | ET ATTACK_RESPONSE Metasploit Meterpreter System Get Idle Time Command Detected; [1,2] | 7,290 | 2015/01/20 | 2009569 | ET ATTACK_RESPONSE Metasploit Meterpreter System Reboot/Shutdown Detected; [1,2] | 7,289 | 2015/01/20 | 2009568 | ET ATTACK_RESPONSE Metasploit Meterpreter Execute Command Detected; [1,2] | 7,288 | 2015/01/20 | 2009567 | ET ATTACK_RESPONSE Metasploit Meterpreter View Current Process ID Command Detected; [1,2] | 7,287 | 2015/01/20 | 2009566 | ET ATTACK_RESPONSE Metasploit Meterpreter Print Working Directory Command Detected; [1,2] | 7,286 | 2015/01/20 | 2009565 | ET ATTACK_RESPONSE Metasploit Meterpreter Kill Process Command Detected; [1,2] | 7,285 | 2015/01/20 | 2009564 | ET ATTACK_RESPONSE Metasploit Meterpreter Route Command Detected; [1,2] | 7,284 | 2015/01/20 | 2009563 | ET ATTACK_RESPONSE Metasploit Meterpreter Sysinfo Command Detected; [1,2] | 7,283 | 2015/01/20 | 2009562 | ET ATTACK_RESPONSE Metasploit Meterpreter ipconfig Command Detected; [1,2] | 7,282 | 2015/01/20 | 2009561 | ET ATTACK_RESPONSE Metasploit Meterpreter Process Migration Detected; [1,2] | 7,281 | 2015/01/20 | 2009560 | ET ATTACK_RESPONSE Metasploit Meterpreter Getuid Command Detected; [1,2] | 7,280 | 2015/01/20 | 2009559 | ET ATTACK_RESPONSE Metasploit Meterpreter Process List (ps) Command Detected; [1,2] | 7,279 | 2015/01/20 | 2009558 | ET ATTACK_RESPONSE Metasploit Meterpreter File Download Detected; [1,2] | 7,278 | 2015/01/20 | 2009557 | ET TROJAN Yoda's Protector Packed Binary - VERY Likely Hostile; [1] | 7,277 | 2015/01/20 | 2009555 | ET SCAN Absinthe SQL Injection Tool HTTP Header Detected; [1,2] | 7,276 | 2015/01/20 | 2009554 | ET TROJAN FAKE/ROGUE AV/Security Application Checkin; [1] | 7,275 | 2015/01/20 | 2009553 | ET TROJAN FAKE/ROGUE AV Encoded data= HTTP POST; [1] | 7,274 | 2015/01/20 | 2009550 | ET TROJAN Banker PWS/Infostealer HTTP GET Checkin; [1,2] | 7,273 | 2015/01/20 | 2009549 | ET TROJAN Generic Downloader - HTTP POST; [1] | 7,272 | 2015/01/20 | 2009548 | ET DELETED Adware/Spyware Adrotator for Rogue AV; [1,2,3,4,5] | 7,271 | 2015/01/20 | 2009547 | ET TROJAN Suspicious User-Agent (Forthgoner) - Possible Trojan Downloader GET Request; [1] | 7,270 | 2015/01/20 | 2009545 | ET MALWARE User-Agent (_TEST_); [1] | 7,269 | 2015/01/20 | 2009544 | ET TROJAN Suspicious User-Agent (InHold) - Possible Trojan Downloader GET Request; [1] | 7,268 | 2015/01/20 | 2009542 | ET DELETED Silentbanker/Yaludle Checkin to C&C; [1] | 7,267 | 2015/01/20 | 2009541 | ET TROJAN Suspicious User-Agent filled with System Details - GET Request; [1] | 7,266 | 2015/01/20 | 2009540 | ET TROJAN PCFlashbang.com Spyware Checkin (PCFlashBangA); [1,2] | 7,265 | 2015/01/20 | 2009539 | ET TROJAN Downloader Infostealer - GET Checkin; [1] | 7,264 | 2015/01/20 | 2009538 | ET TROJAN Suspicious User-Agent (ms_ie) - Crypt.ZPACK Gen Trojan Downloader GET Request; [1] | 7,263 | 2015/01/20 | 2009537 | ET TROJAN Suspicious User-Agent (Loands) - Possible Trojan Downloader GET Request; [1] | 7,262 | 2015/01/20 | 2009536 | ET POLICY External FTP Connection TO Local HP JetDirect Printer; [1,2] | < 391 392 393 394 395 396 397 398 399 400 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|