시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,8112015/01/20 2014588  ET ACTIVEX Quest vWorkspace Broker Client ActiveX Control SaveMiniLaunchFile Remote File Creation/Overwrite 2; [1
11,8102015/01/20 2014587  ET ACTIVEX Possible Quest vWorkspace Broker Client ActiveX Control SaveMiniLaunchFile Remote File Creation/Overwrite; [1
11,8092015/01/20 2014586  ET ACTIVEX Possible Edraw Diagram Component 5 ActiveX LicenseName Access Potential buffer overflow DOS 2; [1
11,8082015/01/20 2014585  ET ACTIVEX Possible Edraw Diagram Component 5 ActiveX LicenseName Access Potential buffer overflow DOS; [1
11,8072015/01/20 2014584  ET MALWARE Win32/Pdfjsc.XD Related Checkin (microsoft_predator_client header field); [1,2
11,8062015/01/20 2014583  ET TROJAN Adware/FakeAV.Kraddare Checkin UA; [1
11,8052015/01/20 2014581  ET TROJAN Hoax.Win32.BadJoke/DownLoader1.57593 Checkin; [1
11,8042015/01/20 2014579  ET TROJAN Likely Infected HTTP POST to PHP with User-Agent of HTTP Client;  
11,8032015/01/20 2014578  ET TROJAN Win32.Winwebsec.B Checkin;  
11,8022015/01/20 2014577  ET CURRENT_EVENTS ET CURRENT_EVENTS Italian Spam Campaign ZIP with EXE Containing Many Underscores;  
11,8012015/01/20 2014576  ET POLICY eBook Generator User-Agent (EBook); [1,2
11,8002015/01/20 2014575  ET INFO Potential Malicious PDF (EmbeddedFiles) improper case; [1
11,7992015/01/20 2014574  ET POLICY CNET TechTracker User-Agent (CNET TechTracker); [1
11,7982015/01/20 2014573  ET TROJAN DNS Query for a known malware domain (sektori.org); [1
11,7972015/01/20 2014572  ET TROJAN DNS Query for a known malware domain (regicsgf.net); [1
11,7962015/01/20 2014571  ET TROJAN HTTP Request to a a known malware domain (sektori.org); [1
11,7952015/01/20 2014570  ET TROJAN HTTP Request to a known malware domain (regicsgf.net); [1
11,7942015/01/20 2014569  ET CURRENT_EVENTS Unkown exploit kit version check;  
11,7932015/01/20 2014568  ET CURRENT_EVENTS Unkown exploit kit jar download;  
11,7922015/01/20 2014567  ET INFO EXE Download With Content Type Specified As Empty;  
11,7912015/01/20 2014566  ET TROJAN W32/UltimateDefender.FakeAV Checkin;  
11,7902015/01/20 2014565  ET CURRENT_EVENTS JavaScript Determining OS MAC and Serving Java Archive File; [1
11,7892015/01/20 2014564  ET TROJAN OS X Backdoor Checkin; [1
11,7882015/01/20 2014563  ET TROJAN Pony Downloader check-in response STATUS-IMPORT-OK;  
11,7872015/01/20 2014562  ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98;  
11,7862015/01/20 2014561  ET CURRENT_EVENTS landing page with malicious Java applet;  
11,7852015/01/20 2014560  ET CURRENT_EVENTS Modified Metasploit Jar;  
11,7842015/01/20 2014559  ET WEB_SPECIFIC_APPS Free PHP photo gallery script path parameter Remote File inclusion Attempt; [1
11,7832015/01/20 2014558  ET WEB_SPECIFIC_APPS Joomla com_br controller parameter Local File Inclusion Attempt; [1
11,7822015/01/20 2014557  ET WEB_SPECIFIC_APPS Joomla com_bulkenquery controller parameter Local File Inclusion Attempt; [1
11,7812015/01/20 2014556  ET WEB_SPECIFIC_APPS wordpress thecartpress plugin loop parameter Local File Inclusion Attempt; [1
11,7802015/01/20 2014555  ET WEB_SPECIFIC_APPS WordPress flash-album-gallery plugin i Parameter Cross Site Scripting Attempt; [1
11,7792015/01/20 2014554  ET WEB_SPECIFIC_APPS WordPress Pretty Link plugin url Parameter Cross Site Scripting Attempt; [1
11,7782015/01/20 2014553  ET ACTIVEX Possible Dell IT Assistant detectIESettingsForITA.ocx ActiveX Control readRegVal Remote Registry Dump Vulnerability 2; [1
11,7772015/01/20 2014552  ET ACTIVEX Possible Dell IT Assistant detectIESettingsForITA.ocx ActiveX Control readRegVal Remote Registry Dump Vulnerability; [1
11,7762015/01/20 2014551  ET ACTIVEX Possible IBM Tivoli Provisioning Manager Express Isig.isigCtl.1 ActiveX RunAndUploadFile Method Overflow 2; [1
11,7752015/01/20 2014550  ET ACTIVEX Possible IBM Tivoli Provisioning Manager Express Isig.isigCtl.1 ActiveX RunAndUploadFile Method Overflow; [1
11,7742015/01/20 2014549  ET CURRENT_EVENTS TDS Sutra - page redirecting to a SutraTDS;  
11,7732015/01/20 2014548  ET CURRENT_EVENTS TDS Sutra - cookie set;  
11,7722015/01/20 2014547  ET CURRENT_EVENTS TDS Sutra - redirect received;  
11,7712015/01/20 2014546  ET CURRENT_EVENTS TDS Sutra - HTTP header redirecting to a SutraTDS;  
11,7702015/01/20 2014545  ET CURRENT_EVENTS TDS Sutra - page redirecting to a SutraTDS;  
11,7692015/01/20 2014544  ET CURRENT_EVENTS TDS Sutra - cookie set;  
11,7682015/01/20 2014543  ET CURRENT_EVENTS TDS Sutra - request in.cgi;  
11,7672015/01/20 2014542  ET CURRENT_EVENTS TDS Sutra - redirect received;  
11,7662015/01/20 2014541  ET SCAN FHScan core User-Agent Detect; [1
11,7652015/01/20 2014540  ET CURRENT_EVENTS Blackhole Landing for Loading prototype catch;  
11,7642015/01/20 2014539  ET CURRENT_EVENTS Malicious TDS /indigo?;  
11,7632015/01/20 2014538  ET CURRENT_EVENTS Initial Blackhole Landing Loading... Please Wait;  
11,7622015/01/20 2014537  ET CURRENT_EVENTS Initial Blackhole Landing .prototype.q catch with split;  
< 301  302  303  304  305  306  307  308  309  310 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.