시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,1112015/01/20 2010492  ET DOS Possible MYSQL SELECT WHERE to User Variable Denial Of Service Attempt; [1,2,3,4
8,1102015/01/20 2010491  ET DOS Possible MYSQL GeomFromWKB() function Denial Of Service Attempt; [1,2,3,4
8,1092015/01/20 2010490  ET TROJAN Vundo User-Agent Check-in; [1,2
8,1082015/01/20 2010489  ET DELETED Potential Inbound NTP denial-of-service attempt (repeated mode 7 reply); [1,2
8,1072015/01/20 2010488  ET DELETED Potential Inbound NTP denial-of-service attempt (repeated mode 7 request); [1,2
8,1062015/01/20 2010487  ET DOS Potential Inbound NTP denial-of-service attempt (repeated mode 7 reply); [1,2
8,1052015/01/20 2010486  ET DOS Potential Inbound NTP denial-of-service attempt (repeated mode 7 request); [1,2
8,1042015/01/20 2010485  ET WEB_SPECIFIC_APPS phptraverse mp3_id.php GLOBALS Parameter Remote File Inclusion Attempt; [1,2
8,1032015/01/20 2010484  ET WEB_SPECIFIC_APPS FormMailer formmailer.admin.inc.php BASE_DIR Parameter Remote File Inclusion Attempt; [1,2
8,1022015/01/20 2010483  ET ACTIVEX IBM Access Support ActiveX GetXMLValue Stack Overflow Attempt; [1,2,3,4
8,1012015/01/20 2010482  ET ACTIVEX IBM Access Support ActiveX GetXMLValue Stack Overflow Attempt; [1,2,3,4
8,1002015/01/20 2010481  ET ACTIVEX SAP AG SAPgui EAI WebViewer2D ActiveX stack buffer overflow CLSid Access; [1,2
8,0992015/01/20 2010480  ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter UPDATE SET SQL Injection Attempt; [1,2
8,0982015/01/20 2010479  ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter INSERT INTO SQL Injection Attempt; [1,2
8,0972015/01/20 2010478  ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter UNION SELECT SQL Injection Attempt; [1,2
8,0962015/01/20 2010477  ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter DELETE FROM SQL Injection Attempt; [1,2
8,0952015/01/20 2010476  ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter SELECT FROM SQL Injection Attempt; [1,2
8,0942015/01/20 2010475  ET WEB_SPECIFIC_APPS KR-Web krgourl.php DOCUMENT_ROOT Parameter Remote File Inclusion Attempt; [1,2
8,0932015/01/20 2010474  ET WEB_SPECIFIC_APPS Joomla eZine Component d4m_ajax_pagenav.php Remote File Inclusion Attempt; [1
8,0922015/01/20 2010473  ET WEB_SPECIFIC_APPS p-Table for WordPress wptable-tinymce.php ABSPATH Parameter RFI Attempt; [1,2
8,0912015/01/20 2010472  ET ACTIVEX SAP GUI vsflexGrid ActiveX CellFontName method Buffer Overflow CLSID Attempt; [1,2,3
8,0902015/01/20 2010471  ET ACTIVEX SAP GUI vsflexGrid ActiveX EditText method Buffer Overflow CLSID Attempt; [1,2,3
8,0892015/01/20 2010470  ET ACTIVEX SAP GUI vsflexGrid ActiveX EditSelText method Buffer Overflow CLSID Attempt; [1,2,3
8,0882015/01/20 2010469  ET ACTIVEX SAP GUI vsflexGrid ActiveX Text method Buffer Overflow CLSID Attempt; [1,2,3
8,0872015/01/20 2010468  ET ACTIVEX SAP GUI vsflexGrid ActiveX Archive method Buffer Overflow CLSID Attempt; [1,2,3
8,0862015/01/20 2010467  ET ACTIVEX SAP GUI vsflexGrid ActiveX Buffer Overflow Function call Attempt; [1,2,3
8,0852015/01/20 2010466  ET WEB_SPECIFIC_APPS PointComma pctemplate.php pcConfig Parameter Remote File Inclusion Attempt; [1,2
8,0842015/01/20 2010465  ET TROJAN Potential Fake AV Download (download/install.php); [1,2,3,4
8,0832015/01/20 2010463  ET WEB_SERVER RFI Scanner Success (Fx29ID); [1,2
8,0822015/01/20 2010462  ET WEB_SERVER Possible Barracuda IM Firewall smtp_test.cgi Cross-Site Scripting Attempt; [1,2
8,0812015/01/20 2010461  ET MALWARE User-Agent (MSIE7 na); [1
8,0802015/01/20 2010460  ET WEB_SERVER Cisco BBSM Captive Portal AccesCodeStart.asp Cross-Site Scripting Attempt; [1,2
8,0792015/01/20 2010458  ET TROJAN Dropper Checkin (often scripts.dlv4.com related); [1
8,0782015/01/20 2010457  ET WEB_SERVER Possible Cisco Adaptive Security Appliance Web VPN FTP or CIFS Authentication Form Phishing Attempt; [1,2
8,0772015/01/20 2010456  ET ACTIVEX SonicWALL SSL VPN Client Remote ActiveX AddRouteEntry Attempt; [1,2
8,0762015/01/20 2010454  ET ATTACK_RESPONSE Metasploit/Meterpreter - Sending metsrv.dll to Compromised Host; [1
8,0752015/01/20 2010453  ET TROJAN Potential Fake AV GET installer_1.exe; [1,2
8,0742015/01/20 2010452  ET TROJAN Potential Fake AV GET installer.1.exe; [1,2
8,0732015/01/20 2010450  ET TROJAN Potential Gemini/Fake AV Download URL Detected; [1,2
8,0722015/01/20 2010449  ET DELETED MALWARE Potential Malware Download, exploit redirect; [1,2
8,0712015/01/20 2010448  ET DELETED MALWARE Potential Malware Download, trojan zbot; [1,2
8,0702015/01/20 2010447  ET DELETED MALWARE Potential Malware Download, rogue antivirus (IAInstall.exe); [1,2
8,0692015/01/20 2010446  ET DELETED MALWARE Potential Malware Download, loadjavad.php exploit; [1,2
8,0682015/01/20 2010444  ET DELETED MALWARE Potential Malware Download, pdf exploit; [1,2
8,0672015/01/20 2010442  ET TROJAN Possible Storm Variant HTTP Post (U); [1,2,3
8,0662015/01/20 2010441  ET TROJAN Possible Storm Variant HTTP Post (S); [1,2,3
8,0652015/01/20 2010440  ET DELETED Potential Malware Download flash-HQ-plugin exe; [1,2
8,0642015/01/20 2010439  ET TROJAN Generic Trojan Checkin (UA VBTagEdit); [1
8,0632015/01/20 2010438  ET MALWARE Possible Malicious Applet Access (justexploit kit); [1,2
8,0622015/01/20 2010437  ET SHELLCODE METASPLOIT BSD SPARC Reverse shell (Not Encoded 3); [1
< 381  382  383  384  385  386  387  388  389  390 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.