시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
13,3112015/01/20 2016164  ET WEB_SPECIFIC_APPS SiteGo get_templet.php of blue Remote File Inclusion Attempt; [1
13,3102015/01/20 2016163  ET WEB_SPECIFIC_APPS SiteGo get_templet.php of green Remote File Inclusion Attempt; [1
13,3092015/01/20 2016162  ET ACTIVEX Possible Sony PC Companion Admin_RemoveDirectory Stack-based Unicode Buffer Overload SEH; [1
13,3082015/01/20 2016161  ET ACTIVEX Possible Sony PC Companion CheckCompatibility method Stack-based Unicode Buffer Overload; [1
13,3072015/01/20 2016160  ET ACTIVEX Possible Sony PC Companion Load method Stack-based Unicode Buffer Overload SEH; [1
13,3062015/01/20 2016159  ET WEB_SPECIFIC_APPS Simple Machines Forum ssi_function parameter path disclosure vulnerability; [1
13,3052015/01/20 2016158  ET WEB_SPECIFIC_APPS Wordpress Google Doc Embedder plugin file parameter Local File Inclusion Attempt; [1
13,3042015/01/20 2016157  ET WEB_SPECIFIC_APPS WHM filtername Parameter Cross Site Scripting Attempt; [1
13,3032015/01/20 2016156  ET WEB_SPECIFIC_APPS Mahara query Parameter Cross Site Scripting Attempt; [1
13,3022015/01/20 2016155  ET CURRENT_EVENTS Magnitude EK (formerly Popads) - Font Exploit - 32HexChar.eot;  
13,3012015/01/20 2016154  ET CURRENT_EVENTS Possible TURKTRUST Spoofed Google Cert;  
13,3002015/01/20 2016153  ET WEB_SERVER WebShell - JSP File Admin - POST Structure - dir;  
13,2992015/01/20 2016152  ET WEB_SERVER WebShell - JSP File Admin;  
13,2982015/01/20 2016151  ET WEB_SERVER WebShell - JSP RAT;  
13,2972015/01/20 2016150  ET INFO Session Traversal Utilities for NAT (STUN Binding Response); [1
13,2962015/01/20 2016149  ET INFO Session Traversal Utilities for NAT (STUN Binding Request); [1
13,2952015/01/20 2016148  ET WEB_SPECIFIC_APPS WordPress Plugin Advanced Custom Fields Remote File Inclusion;  
13,2942015/01/20 2016147  ET TROJAN Request for fake postal receipt from e-mail link;  
13,2932015/01/20 2016146  ET INFO PTUNNEL INBOUND; [1,2
13,2922015/01/20 2016145  ET INFO PTUNNEL OUTBOUND; [1,2
13,2912015/01/20 2016144  ET CURRENT_EVENTS Injected iframe leading to Redkit Jan 02 2013;  
13,2902015/01/20 2016143  ET DELETED Sweet Orange Java obfuscated binary (2);  
13,2892015/01/20 2016142  ET CURRENT_EVENTS Sweet Orange Java payload request (2);  
13,2882015/01/20 2016141  ET INFO Exectuable Download from dotted-quad Host;  
13,2872015/01/20 2016140  ET DELETED Suspicious User Agent (iexplorer);  
13,2862015/01/20 2016139  ET TROJAN TR/Spy.55808.201;  
13,2852015/01/20 2016138  ET CURRENT_EVENTS Possible Exodus Intel IE HTML TIME EIP Control Technique; [1
13,2842015/01/20 2016137  ET CURRENT_EVENTS CVE-2012-4792 EIP in URI (1); [1,2
13,2832015/01/20 2016136  ET CURRENT_EVENTS Metasploit CVE-2012-4792 EIP in URI IE 8; [1,2
13,2822015/01/20 2016135  ET CURRENT_EVENTS CFR DRIVEBY CVE-2012-4792 DNS Query for C2 domain; [1,2
13,2812015/01/20 2016134  ET CURRENT_EVENTS Escaped Unicode Char in Location CVE-2012-4792 EIP % Hex Encode; [1,2
13,2802015/01/20 2016133  ET CURRENT_EVENTS Escaped Unicode Char in Location CVE-2012-4792 EIP (Exploit Specific replace); [1,2
13,2792015/01/20 2016132  ET CURRENT_EVENTS Escaped Unicode Char in Window Location CVE-2012-4792 EIP; [1,2
13,2782015/01/20 2016131  ET DELETED Stabuniq Observed C&C POST Target /rss.php; [1,2,3
13,2772015/01/20 2016130  ET TROJAN Stabuniq Checkin; [1,2,3
13,2762015/01/20 2016129  ET CURRENT_EVENTS Unknown_gmf/Styx EK - fnts.html;  
13,2752015/01/20 2016128  ET CURRENT_EVENTS RedKit - Landing Page;  
13,2742015/01/20 2016127  ET TROJAN W32/Downloader.FakeFlashPlayer Kelimeid CnC Beacon;  
13,2732015/01/20 2016126  ET TROJAN W32/Downloader.FakeFlashPlayer Bitensiteler CnC Beacon;  
13,2722015/01/20 2016125  ET TROJAN W32/Downloader.FakeFlashPlayer Status.Php CnC Beacon;  
13,2712015/01/20 2016124  ET TROJAN W32/Downloader.FakeFlashPlayer Clientregister.php CnC Beacon;  
13,2702015/01/20 2016123  ET WEB_SPECIFIC_APPS Wordpress Myflash path parameter Local File Inclusion Attempt; [1
13,2692015/01/20 2016122  ET WEB_SPECIFIC_APPS LogAnalyzer asktheoracle.php file XSS Attempt; [1
13,2682015/01/20 2016121  ET WEB_SPECIFIC_APPS WordPress Relocate Upload plugin abspath parameter Remote File Inclusion Attempt; [1
13,2672015/01/20 2016120  ET WEB_SPECIFIC_APPS Wiki Web Help configpath parameter Remote File Inclusion Attempt; [1
13,2662015/01/20 2016119  ET WEB_SPECIFIC_APPS Symantec Messaging Gateway 9.5.3-3 - Arbitrary file download 2; [1
13,2652015/01/20 2016118  ET ACTIVEX Possible Advantech Studio ISSymbol ActiveX Control Multiple Buffer Overflow Attempt; [1
13,2642015/01/20 2016117  ET WEB_SPECIFIC_APPS WordPress Mailing List plugin wpabspath parameter Remote File Inclusion Attempt; [1
13,2632015/01/20 2016116  ET WEB_SPECIFIC_APPS gpEasy CMS key parameter XSS Attempt; [1
13,2622015/01/20 2016115  ET WEB_SPECIFIC_APPS gpEasy CMS index.php file XSS Attempt; [1
< 271  272  273  274  275  276  277  278  279  280 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.