시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,2612015/01/20 2009535  ET POLICY Telnet to HP JetDirect Printer With No Password Set; [1,2
7,2602015/01/20 2009534  ET TROJAN Suspicious User-Agent (Poker); [1,2
7,2592015/01/20 2009533  ET TROJAN Keylogger Pro Update Check; [1,2
7,2582015/01/20 2009532  ET TROJAN BackDoor-EGB Check-in; [1,2
7,2572015/01/20 2009531  ET TROJAN Gamania Trojan Check-in; [1,2
7,2562015/01/20 2009530  ET TROJAN Sality - Fake Opera User-Agent (Opera/8.89); [1,2,3
7,2552015/01/20 2009527  ET TROJAN Generic Downloader Checkin - HTTP GET; [1
7,2542015/01/20 2009526  ET TROJAN Downloader Checkin - Downloads Rogue Adware; [1
7,2532015/01/20 2009525  ET TROJAN Sality - Fake Opera User-Agent; [1,2,3
7,2522015/01/20 2009524  ET MALWARE MySideSearch Browser Optimizer; [1,2,3,4
7,2512015/01/20 2009522  ET TROJAN Win32/Pasta Downloader - GET Checkin to Fake GIF; [1,2
7,2502015/01/20 2009521  ET TROJAN Win32/Nubjub.A HTTP Check-in; [1
7,2492015/01/20 2009520  ET TROJAN Urlzone/Bebloh Trojan Check-in; [1
7,2482015/01/20 2009519  ET TROJAN Gaboc Trojan Check-in; [1,2
7,2472015/01/20 2009518  ET TROJAN s4t4n1c Trojan Check-in; [1
7,2462015/01/20 2009517  ET TROJAN Qhosts Trojan Check-in; [1,2
7,2452015/01/20 2009516  ET TROJAN Generic Win32.Autorun HTTP Post; [1,2
7,2442015/01/20 2009514  ET TROJAN FAKE/ROGUE AV HTTP Post; [1
7,2432015/01/20 2009513  ET WEB_SPECIFIC_APPS Possible Rentventory SQL Injection Attempt; [1,2
7,2422015/01/20 2009512  ET TROJAN Suspicious User-Agent (Session) - Possible Trojan-Clicker; [1
7,2412015/01/20 2009511  ET EXPLOIT VLC web interface buffer overflow attempt; [1,2
7,2402015/01/20 2009509  ET WEB_SPECIFIC_APPS Job2C detail.php adtype Parameter Local File Inclusion; [1,2
7,2392015/01/20 2009508  ET WEB_SPECIFIC_APPS Job2C windetail.php adtype Parameter Local File Inclusion; [1,2
7,2382015/01/20 2009507  ET WEB_SPECIFIC_APPS Falcon Series One sitemap.xml.php dir Parameter Local File Inclusion; [1,2,3
7,2372015/01/20 2009506  ET WEB_SPECIFIC_APPS Falcon Series One sitemap.xml.php dir Parameter Remote File Inclusion; [1,2,3
7,2362015/01/20 2009505  ET WEB_SPECIFIC_APPS Quantum Game Library smarty.inc.php CONFIG Parameter Local File Inclusion; [1,2,3
7,2352015/01/20 2009504  ET WEB_SPECIFIC_APPS Quantum Game Library smarty.inc.php CONFIG Parameter Remote File Inclusion; [1,2,3
7,2342015/01/20 2009503  ET WEB_SPECIFIC_APPS Quantum Game Library server_request.php CONFIG Parameter Local File Inclusion; [1,2,3
7,2332015/01/20 2009502  ET WEB_SPECIFIC_APPS Quantum Game Library server_request.php CONFIG Parameter Remote File Inclusion; [1,2,3
7,2322015/01/20 2009501  ET WEB_SPECIFIC_APPS nweb2fax viewrq.php var_filename Parameter Directory Traversal; [1,2
7,2312015/01/20 2009500  ET ACTIVEX Chinagames ActiveX Control CreateChinagames Method Buffer Overflow; [1,2
7,2302015/01/20 2009499  ET WEB_SPECIFIC_APPS Horde XSS attempt passwd/main.php (2); [1,2
7,2292015/01/20 2009498  ET WEB_SPECIFIC_APPS Horde XSS attempt test.php (2); [1,2
7,2282015/01/20 2009497  ET WEB_SPECIFIC_APPS Horde XSS attempt colorpicker.php (2); [1,2
7,2272015/01/20 2009496  ET WEB_SPECIFIC_APPS Horde XSS attempt passwd/main.php; [1,2
7,2262015/01/20 2009495  ET WEB_SPECIFIC_APPS Horde XSS attempt test.php; [1,2
7,2252015/01/20 2009494  ET WEB_SPECIFIC_APPS Horde XSS attempt colorpicker.php; [1,2
7,2242015/01/20 2009493  ET DELETED Likely MSVIDCTL.dll exploit in transit; [1,2,3
7,2232015/01/20 2009491  ET DELETED Microsoft DirectShow ActiveX Exploit Attempt; [1,2,3
7,2222015/01/20 2009487  ET TROJAN Downloader Possible AV KILLER; [1
7,2212015/01/20 2009486  ET TROJAN APT1 WEBC2-UGX Related Pingbed/Downbot User-Agent (Windows NT 5.x); [1
7,2202015/01/20 2009485  ET WEB_SERVER /etc/shadow Detected in URI; [1,2
7,2192015/01/20 2009484  ET WEB_SERVER Cpanel lastvisit.html Arbitary file disclosure; [1,2
7,2182015/01/20 2009483  ET SCAN Grabber.py Web Scan Detected; [1,2
7,2172015/01/20 2009481  ET SCAN Grendel-Scan Web Application Security Scan Detected; [1,2
7,2162015/01/20 2009480  ET SCAN Grendel Web Scan - Default User Agent Detected; [1,2
7,2152015/01/20 2009479  ET SCAN Asp-Audit Web Scan Detected; [1,2,3
7,2142015/01/20 2009478  ET DELETED SQLCheck Database Scan Detected; [1,2
7,2132015/01/20 2009477  ET SCAN SQLBrute SQL Scan Detected; [1,2,3
7,2122015/01/20 2009476  ET SCAN Possible jBroFuzz Fuzzer Detected; [1,2
< 391  392  393  394  395  396  397  398  399  400 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.