시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,5612015/01/20 2016424  ET TROJAN Win32/Vundo.OD Checkin; [1,2
13,5602015/01/20 2016423  ET DNS Reply Sinkhole - Georgia Tech (2); [1
13,5592015/01/20 2016422  ET DNS Reply Sinkhole - Georgia Tech (1); [1
13,5582015/01/20 2016421  ET DNS Reply Sinkhole - 1and1 Internet AG; [1
13,5572015/01/20 2016420  ET DNS Reply Sinkhole - German Company; [1
13,5562015/01/20 2016419  ET DNS Reply Sinkhole - Zinkhole.org;  
13,5552015/01/20 2016418  ET DNS Reply Sinkhole - Dr. Web; [1
13,5542015/01/20 2016417  ET TROJAN W32/Vundo.Downloader Reporting User Website Session Information; [1
13,5532015/01/20 2016416  ET WEB_SERVER base64_decode in UA; [1
13,5522015/01/20 2016415  ET WEB_SERVER PHP tag in UA; [1
13,5512015/01/20 2016414  ET CURRENT_EVENTS CoolEK Payload Download (5);  
13,5502015/01/20 2016413  ET DNS Reply Sinkhole - sinkhole.cert.pl 148.81.111.111;  
13,5492015/01/20 2016412  ET CURRENT_EVENTS TDS Vdele;  
13,5482015/01/20 2016411  ET TROJAN PDF 0day Communication - agent UA Feb 14 2013; [1
13,5472015/01/20 2016410  ET CURRENT_EVENTS Adobe PDF Zero Day Trojan.666 Payload libarext32.dll Second Stage Download POST; [1
13,5462015/01/20 2016409  ET CURRENT_EVENTS Adobe PDF Zero Day Trojan.666 Payload libarhlp32.dll Second Stage Download POST; [1
13,5452015/01/20 2016408  ET CURRENT_EVENTS CoolEK Payload Download (4);  
13,5442015/01/20 2016407  ET CURRENT_EVENTS Cool Java Exploit Recent Jar (1);  
13,5432015/01/20 2016406  ET CURRENT_EVENTS CoolEK landing applet plus class Feb 12 2013;  
13,5422015/01/20 2016405  ET DELETED CoolEK - PDF Exploit - Feb 12 2013;  
13,5412015/01/20 2016404  ET INFO MPEG Download Over HTTP (1);  
13,5402015/01/20 2016403  ET CURRENT_EVENTS CoolEK Payload - obfuscated binary base 0;  
13,5392015/01/20 2016402  ET CURRENT_EVENTS Exploit Kit Java png download;  
13,5382015/01/20 2016401  ET CURRENT_EVENTS Flash Action Script Invalid Regex CVE-2013-0634;  
13,5372015/01/20 2016400  ET CURRENT_EVENTS Flash Action Script Invalid Regex CVE-2013-0634;  
13,5362015/01/20 2016399  ET TROJAN W32/FloatingCloud.Banker CnC Beacon; [1
13,5352015/01/20 2016398  ET TROJAN Variant.Graftor.5628 CnC Traffic; [1
13,5342015/01/20 2016397  ET CURRENT_EVENTS Exploit Specific Uncompressed Flash Inside of OLE CVE-2013-0634;  
13,5332015/01/20 2016396  ET CURRENT_EVENTS Exploit Specific Uncompressed Flash CVE-2013-0634;  
13,5322015/01/20 2016395  ET WEB_CLIENT Microsoft OLE Compound File With Flash;  
13,5312015/01/20 2016394  ET WEB_CLIENT Adobe Flash Uncompressed;  
13,5302015/01/20 2016393  ET CURRENT_EVENTS Impact Exploit Kit Landing Page;  
13,5292015/01/20 2016391  ET CURRENT_EVENTS Adobe Flash Zero Day LadyBoyle Infection Campaign; [1,2
13,5282015/01/20 2016390  ET WEB_SPECIFIC_APPS Glossword gw_admin.php Cross Site Scripting Attempt; [1
13,5272015/01/20 2016389  ET WEB_SPECIFIC_APPS SiteGo OpenFolder parameter Local File Inclusion Attempt; [1
13,5262015/01/20 2016388  ET WEB_SPECIFIC_APPS SiteGo file parameter Local File Inclusion Attempt; [1
13,5252015/01/20 2016387  ET DELETED Android/DNightmare -Task Killer Checkin 3;  
13,5242015/01/20 2016386  ET DELETED Android/DNightmare - Task Killer Checkin 2;  
13,5232015/01/20 2016385  ET DELETED Android/DNightmare - Task Killer Checkin 1; [1
13,5222015/01/20 2016384  ET WEB_SPECIFIC_APPS WordPress CommentLuv Plugin _ajax_nonce Parameter XSS Attempt; [1
13,5212015/01/20 2016383  ET WEB_SPECIFIC_APPS Wordpress Audio Player Plugin playerID parameter XSS attempt in swf; [1
13,5202015/01/20 2016382  ET ACTIVEX Possible Ecava IntegraXor save method Remote ActiveX Buffer Overflow; [1
13,5192015/01/20 2016381  ET WEB_SPECIFIC_APPS WordPress WP ecommerce Shop Styling Plugin dompdf RFI Attempt; [1
13,5182015/01/20 2016380  ET CURRENT_EVENTS Sakura Exploit Kit Encrypted Binary (1);  
13,5172015/01/20 2016379  ET CURRENT_EVENTS DRIVEBY Generic - JAR Containing Windows Executable;  
13,5162015/01/20 2016378  ET CURRENT_EVENTS Unknown_MM EK - Java Exploit - fbyte.jar;  
13,5152015/01/20 2016377  ET CURRENT_EVENTS Unknown_MM - Payload Download;  
13,5142015/01/20 2016375  ET CURRENT_EVENTS Unknown_MM - Java Exploit - jre.jar;  
13,5132015/01/20 2016374  ET CURRENT_EVENTS Unknown_MM - Java Exploit - jaxws.jar;  
13,5122015/01/20 2016373  ET CURRENT_EVENTS Unknown_MM EK - Landing Page;  
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.