시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,1612015/01/20 2011792  ET DELETED Shiz/Rohimafo Proxy Registration; [1,2,3,4,5
9,1602015/01/20 2011791  ET TROJAN Shiz/Rohimafo Checkin; [1,2,3,4,5,6
9,1592015/01/20 2011769  ET TROJAN Shiz/Rohimafo Binary Download Request; [1,2,3,4,5,6
9,1582015/01/20 2011768  ET WEB_SERVER PHP tags in HTTP POST; [1
9,1572015/01/20 2011767  ET TROJAN Avzhan DDOS Bot Inbound Hardcoded Malformed GET Request Denial Of Service Attack Detected; [1
9,1562015/01/20 2011766  ET SCAN Modified Sipvicious User-Agent Detected (sundayddr); [1,2,3,4
9,1552015/01/20 2011765  ET POLICY eval(function(p a c k e d) JavaScript from nginx Detected - Likely Hostile; [1
9,1542015/01/20 2011764  ET WEB_CLIENT Possible Microsoft Internet Explorer mshtml.dll Timer ID Memory Pointer Information Disclosure Attempt; [1,2,3
9,1532015/01/20 2011763  ET WEB_SERVER Possible Cisco PIX/ASA HTTP Web Interface HTTP Response Splitting Attempt; [1,2,3
9,1522015/01/20 2011761  ET DOS Possible MySQL ALTER DATABASE Denial Of Service Attempt; [1,2,3
9,1512015/01/20 2011760  ET DELETED Likely FAKEAV scanner page encountered - i1000000.gif; [1
9,1502015/01/20 2011759  ET WEB_SERVER TIEHTTP User-Agent; [1
9,1492015/01/20 2011758  ET GAMES TrackMania Ad Report; [1,2
9,1482015/01/20 2011757  ET GAMES TrackMania Request LiveUpdate; [1,2
9,1472015/01/20 2011756  ET GAMES TrackMania Request SearchNew; [1,2
9,1462015/01/20 2011755  ET GAMES TrackMania Request GetBuddies; [1,2
9,1452015/01/20 2011754  ET GAMES TrackMania Request GetOnlineProfile; [1,2
9,1442015/01/20 2011753  ET GAMES TrackMania Request Disconnect; [1,2
9,1432015/01/20 2011752  ET GAMES TrackMania Request Connect; [1,2
9,1422015/01/20 2011751  ET GAMES TrackMania Request OpenSession; [1,2
9,1412015/01/20 2011750  ET GAMES TrackMania Request GetConnectionAndGameParams; [1,2
9,1402015/01/20 2011749  ET GAMES TrackMania Game Check for Patch; [1,2
9,1392015/01/20 2011748  ET GAMES TrackMania Game Launch; [1,2
9,1382015/01/20 2011747  ET GAMES TeamSpeak2 ACK; [1,2
9,1372015/01/20 2011746  ET GAMES TeamSpeak2 Standard/Disconnect; [1,2
9,1362015/01/20 2011745  ET GAMES TeamSpeak2 Standard/Known Player Update; [1,2
9,1352015/01/20 2011744  ET GAMES TeamSpeak2 Standard/Change Status; [1,2
9,1342015/01/20 2011743  ET GAMES TeamSpeak2 Standard/Player Left; [1,2
9,1332015/01/20 2011742  ET GAMES TeamSpeak2 Standard/New Player Joined; [1,2
9,1322015/01/20 2011741  ET GAMES TeamSpeak2 Standard/Login End; [1,2
9,1312015/01/20 2011740  ET GAMES TeamSpeak2 Standard/Player List; [1,2
9,1302015/01/20 2011739  ET GAMES TeamSpeak2 Standard/Channel List; [1,2
9,1292015/01/20 2011738  ET GAMES TeamSpeak2 Standard/Login Part 2; [1,2
9,1282015/01/20 2011737  ET GAMES TeamSpeak2 Connection/Ping Reply; [1,2
9,1272015/01/20 2011736  ET GAMES TeamSpeak2 Connection/Ping; [1,2
9,1262015/01/20 2011735  ET GAMES TeamSpeak2 Connection/Login Replay; [1,2
9,1252015/01/20 2011734  ET GAMES TeamSpeak2 Connection/Login; [1,2
9,1242015/01/20 2011733  ET GAMES TeamSpeak3 Connect; [1,2
9,1232015/01/20 2011732  ET DOS Possible VNC ClientCutText Message Denial of Service/Memory Corruption Attempt; [1,2
9,1222015/01/20 2011731  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter Cross Site Scripting Attempt; [1,2
9,1212015/01/20 2011730  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter UPDATE SET SQL Injection Attempt; [1,2
9,1202015/01/20 2011729  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter INSERT INTO SQL Injection Attempt; [1,2
9,1192015/01/20 2011728  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter UNION SELECT SQL Injection Attempt; [1,2
9,1182015/01/20 2011727  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter DELETE FROM SQL Injection Attempt; [1,2
9,1172015/01/20 2011726  ET WEB_SPECIFIC_APPS SchoolMation studentmain.php session Parameter SELECT FROM SQL Injection Attempt; [1,2
9,1162015/01/20 2011725  ET WEB_SPECIFIC_APPS EZPX photoblog tpl_base_dir Parameter Remote File Inclusion Attempt; [1,2,3
9,1152015/01/20 2011724  ET WEB_SPECIFIC_APPS Webmoney Advisor ActiveX Control DoS Function Call; [1,2
9,1142015/01/20 2011723  ET WEB_SPECIFIC_APPS Webmoney Advisor ActiveX Redirect Method Remote DoS Attempt; [1,2
9,1132015/01/20 2011722  ET ACTIVEX Axis Media Controller ActiveX SetImage Method Remote Code Execution Attempt; [1
9,1122015/01/20 2011721  ET SCAN Possible Fast-Track Tool Spidering User-Agent Detected; [1,2
< 351  352  353  354  355  356  357  358  359  360 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.