시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,7112015/01/20 2011146  ET MALWARE User-Agent (Download Master) - Possible Malware Downloader; [1,2,3
8,7102015/01/20 2011145  ET WEB_SERVER 3Com Intelligent Management Center Cross Site Scripting Attempt; [1,2,3,4
8,7092015/01/20 2011144  ET WEB_SERVER PHP Easteregg Information-Disclosure (funny-logo); [1,2,3,4
8,7082015/01/20 2011143  ET WEB_SERVER PHP Easteregg Information-Disclosure (zend-logo); [1,2,3,4
8,7072015/01/20 2011142  ET WEB_SERVER PHP Easteregg Information-Disclosure (php-logo); [1,2,3,4
8,7062015/01/20 2011141  ET WEB_SERVER PHP Easteregg Information-Disclosure (phpinfo); [1,2,3,4
8,7052015/01/20 2011140  ET WEB_SPECIFIC_APPS JE Ajax Event Calendar view Parameter Local File Inclusion Attempt; [1,2
8,7042015/01/20 2011139  ET WEB_SPECIFIC_APPS XAMPP xamppsecurity.phpp TEXT Parameter Cross Site Scripting Attempt; [1
8,7032015/01/20 2011138  ET WEB_SPECIFIC_APPS XAMPP showcode.php TEXT Parameter Cross Site Scripting Attempt; [1
8,7022015/01/20 2011137  ET WEB_SPECIFIC_APPS PHP-Nuke viewslink module sid Parameter UPDATE SET SQL Injection Attempt; [1,2
8,7012015/01/20 2011136  ET WEB_SPECIFIC_APPS PHP-Nuke viewslink module sid Parameter INSERT INTO SQL Injection Attempt; [1,2
8,7002015/01/20 2011135  ET WEB_SPECIFIC_APPS PHP-Nuke viewslink module sid Parameter UNION SELECT SQL Injection Attempt; [1,2
8,6992015/01/20 2011134  ET WEB_SPECIFIC_APPS PHP-Nuke viewslink module sid Parameter DELETE FROM SQL Injection Attempt; [1,2
8,6982015/01/20 2011133  ET WEB_SPECIFIC_APPS PHP-Nuke viewslink module sid Parameter SELECT FROM SQL Injection Attempt; [1,2
8,6972015/01/20 2011132  ET WEB_SPECIFIC_APPS Joomla com_universal Component Remote File Inclusion; [1,2
8,6962015/01/20 2011131  ET WEB_SPECIFIC_APPS Joomla jwmmxtd Component mosConfig_absolute_path Parameter Remote File Inclusion; [1,2
8,6952015/01/20 2011130  ET ACTIVEX Possible Attachmate Reflection X ActiveX Control 'ControlID' Buffer Overflow Function Call Attempt; [1
8,6942015/01/20 2011129  ET ACTIVEX Possible Attachmate Reflection X ActiveX Control 'ControlID' Buffer Overflow Attempt; [1
8,6932015/01/20 2011128  ET TROJAN Eleonore Exploit Pack activity variant May 2010; [1,2
8,6922015/01/20 2011127  ET MALWARE Suspicious User-Agent (InTeRNeT); [1
8,6912015/01/20 2011126  ET ACTIVEX Possible VMware Console ActiveX Format String Remote Code Execution Attempt; [1,2,3
8,6902015/01/20 2011125  ET POLICY Maxthon Browser Background Agent UA (MxAgent); [1
8,6892015/01/20 2011124  ET MALWARE Suspicious FTP 220 Banner on Local Port (spaced); [1
8,6882015/01/20 2011123  ET MALWARE User-Agent (Yodao Desktop Dict); [1
8,6872015/01/20 2011122  ET WEB_SERVER Possible SQL injection obfuscated via REVERSE function; [1,2
8,6862015/01/20 2011121  ET TROJAN Phoenix Exploit Kit Facebook phishing page payload could be ZeuS; [1,2
8,6852015/01/20 2011120  ET MALWARE User-Agent (Save); [1
8,6842015/01/20 2011118  ET DELETED Suspicious User Agent Maxthon; [1
8,6832015/01/20 2011117  ET WEB_SPECIFIC_APPS PowerEasy ComeUrl Parameter Cross Site Scripting Attempt; [1,2
8,6822015/01/20 2011116  ET WEB_SPECIFIC_APPS Gallo gfw_smarty.php gfwroot Parameter Remote File Inclusion Attempt; [1,2
8,6812015/01/20 2011115  ET WEB_SPECIFIC_APPS cPanel fileop Parameter Cross Site Scripting Attempt; [1,2
8,6802015/01/20 2011114  ET WEB_SPECIFIC_APPS ARISg errmsg Parameter Cross Site Scripting Attempt; [1,2
8,6792015/01/20 2011113  ET WEB_SPECIFIC_APPS Business Objects Crystal Reports Web Form Viewer Directory Traversal Attempt; [1,2
8,6782015/01/20 2011112  ET WEB_SPECIFIC_APPS Openfire Jabber-Server type Parameter UPDATE SET SQL Injection Attempt; [1,2
8,6772015/01/20 2011111  ET WEB_SPECIFIC_APPS Openfire Jabber-Server type Parameter INSERT INTO SQL Injection Attempt; [1,2
8,6762015/01/20 2011110  ET WEB_SPECIFIC_APPS Openfire Jabber-Server type Parameter UNION SELECT SQL Injection Attempt; [1,2
8,6752015/01/20 2011109  ET WEB_SPECIFIC_APPS Openfire Jabber-Server type Parameter DELETE FROM SQL Injection Attempt; [1,2
8,6742015/01/20 2011108  ET WEB_SPECIFIC_APPS Openfire Jabber-Server type Parameter SELECT FROM SQL Injection Attempt; [1,2
8,6732015/01/20 2011107  ET WEB_SPECIFIC_APPS WordPress WP-Cumulus Plugin tagcloud.swf Cross-Site Scripting Attempt; [1
8,6722015/01/20 2011106  ET MALWARE Suspicious User-Agent (lineguide); [1
8,6712015/01/20 2011105  ET MALWARE User-Agent (i-scan); [1
8,6702015/01/20 2011104  ET TROJAN Exploit kit attack activity likely hostile; [1,2
8,6692015/01/20 2011103  ET TROJAN Exploit kit download payload likely Hiloti Gozi FakeAV etc; [1,2
8,6682015/01/20 2011101  ET MALWARE Recuva User-Agent (OpenPage) - likely trojan dropper; [1
8,6672015/01/20 2011100  ET WEB_SPECIFIC_APPS DaFun Spirit lgsl_settings.php lgsl_path Parameter Remote File Inclusion; [1,2
8,6662015/01/20 2011099  ET WEB_SPECIFIC_APPS DaFun Spirit lgsl_players.php lgsl_path Parameter Remote File Inclusion; [1,2
8,6652015/01/20 2011098  ET WEB_SPECIFIC_APPS YaPig last_gallery.php YAPIG_PATH Parameter Remote File Inclusion Attempt; [1,2
8,6642015/01/20 2011097  ET WEB_SPECIFIC_APPS Fatwiki monatsblatt.php Remote File Inclusion Attempt; [1,2
8,6632015/01/20 2011096  ET WEB_SPECIFIC_APPS Fatwiki datumscalc.php Remote File Inclusion Attempt; [1,2
8,6622015/01/20 2011095  ET WEB_SPECIFIC_APPS Manage Engine Service Desk Plus WorkOrder.do UPDATE SET SQL Injection Attempt; [1,2,3
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.