시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,4112015/01/20 2009705  ET MALWARE W3i Related Adware/Spyware; [1,2
7,4102015/01/20 2009704  ET TROJAN Win32.Hupigon.dkwt Related Checkin; [1
7,4092015/01/20 2009703  ET TROJAN Suspicious User-Agent (INet); [1
7,4082015/01/20 2009702  ET POLICY DNS Update From External net; [1
7,4072015/01/20 2009701  ET DOS DNS BIND 9 Dynamic Update DoS attempt; [1
7,4062015/01/20 2009700  ET VOIP Multiple Unauthorized SIP Responses UDP; [1
7,4052015/01/20 2009699  ET VOIP REGISTER Message Flood UDP; [1
7,4042015/01/20 2009698  ET VOIP INVITE Message Flood UDP; [1
7,4032015/01/20 2009697  ET POLICY External Connection to Altiris Console; [1,2
7,4022015/01/20 2009696  ET POLICY External Connection to Altiris HelpDesk; [1,2
7,4012015/01/20 2009694  ET TROJAN Navipromo related update; [1
7,4002015/01/20 2009693  ET WEB_SPECIFIC_APPS Zen Cart Remote Code Execution; [1,2,3
7,3992015/01/20 2009691  ET WEB_SPECIFIC_APPS WebMoney html2.php page Remote File Inclusion; [1,2
7,3982015/01/20 2009690  ET WEB_SPECIFIC_APPS WebMoney html.php page Remote File Inclusion; [1,2
7,3972015/01/20 2009689  ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 3; [1,2
7,3962015/01/20 2009688  ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 2; [1,2
7,3952015/01/20 2009687  ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 1; [1,2
7,3942015/01/20 2009685  ET TROJAN Unkown Trojan User-Agent (5.1 ...); [1
7,3932015/01/20 2009684  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 6; [1,2,3
7,3922015/01/20 2009683  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 5; [1,2,3
7,3912015/01/20 2009682  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 4; [1,2,3
7,3902015/01/20 2009681  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 3; [1,2,3
7,3892015/01/20 2009680  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 2; [1,2,3
7,3882015/01/20 2009679  ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 1; [1,2,3
7,3872015/01/20 2009678  ET WEB_SERVER Possible DD-WRT Metacharacter Injection Command Execution Attempt; [1,2,3,4
7,3862015/01/20 2009677  ET WEB_SERVER Possible BASE Authentication Bypass Attempt; [1,2,3
7,3852015/01/20 2009676  ET ATTACK_RESPONSE Ipconfig Response Detected; [1,2
7,3842015/01/20 2009675  ET ATTACK_RESPONSE Possible Ipconfig Information Detected in HTTP Response; [1,2
7,3832015/01/20 2009674  ET WEB_SPECIFIC_APPS Guestbook guestbook.php mes_id SQL Injection attempt; [1,2
7,3822015/01/20 2009673  ET WEB_SPECIFIC_APPS programsrating postcomments.php id XSS attempt; [1,2
7,3812015/01/20 2009672  ET WEB_SPECIFIC_APPS programsrating rate.php id XSS attempt; [1,2
7,3802015/01/20 2009671  ET WEB_SPECIFIC_APPS millionpixel payment.php order_id XSS attempt; [1,2
7,3792015/01/20 2009670  ET WEB_SERVER Nagios statuswml.cgi Remote Arbitrary Shell Command Injection attempt; [1
7,3782015/01/20 2009668  ET POLICY FTP Frequent Admin Login Attempts; [1
7,3772015/01/20 2009667  ET POLICY FTP Frequent Administrator Login Attempts; [1
7,3762015/01/20 2009665  ET DELETED Possible JAVA pack200-zip-exploit attempt; [1,2
7,3752015/01/20 2009663  ET WEB_SPECIFIC_APPS TotalCalendar config.php inc_dir Parameter Remote File Inclusion; [1,2
7,3742015/01/20 2009661  ET WEB_SPECIFIC_APPS artmedic weblog artmedic_print.php date Parameter Local File Inclusion; [1,2,3
7,3732015/01/20 2009660  ET WEB_SPECIFIC_APPS PowerPHPBoard header.inc.php settings Parameter Local File Inclusion; [1,2,3
7,3722015/01/20 2009659  ET WEB_SPECIFIC_APPS PowerPHPBoard footer.inc.php settings Parameter Local File Inclusion; [1,2,3
7,3712015/01/20 2009658  ET WEB_SPECIFIC_APPS Kalptaru Infotech Automated Link Exchange Portal cat_id Parameter SQL Injection; [1,2
7,3702015/01/20 2009657  ET ACTIVEX BaoFeng Storm ActiveX Control SetAttributeValue Method Buffer Overflow; [1,2,3,4
7,3692015/01/20 2009656  ET WEB_SPECIFIC_APPS SMA-DB format.php _page_content Parameter Remote File Inclusion; [1,2
7,3682015/01/20 2009654  ET WEB_SPECIFIC_APPS SMA-DB format.php _page_javascript Parameter Remote File Inclusion; [1,2
7,3672015/01/20 2009653  ET WEB_SPECIFIC_APPS SMA-DB format.php _page_css Parameter Remote File Inclusion; [1,2
7,3662015/01/20 2009652  ET WEB_SPECIFIC_APPS FreeWebShop startmodules.inc.php lang_file Parameter Local File Inclusion; [1,2
7,3652015/01/20 2009651  ET ATTACK_RESPONSE Metasploit Meterpreter Channel Interaction Detected, Likely Interaction With Executable; [1,2
7,3642015/01/20 2009650  ET WEB_SPECIFIC_APPS Hubscript PHPInfo Attempt; [1,2
7,3632015/01/20 2009647  ET WEB_SPECIFIC_APPS Hubscript XSS Attempt; [1,2
7,3622015/01/20 2009646  ET SCAN Acunetix Version 6 (Free Edition) Scan Detected; [1,2
< 391  392  393  394  395  396  397  398  399  400 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.