시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,3112015/01/20 2011949  ET WEB_SPECIFIC_APPS AWCM common.php Remote File Inclusion Attempt; [1
9,3102015/01/20 2011948  ET WEB_SPECIFIC_APPS AWCM window_top.php Remote File Inclusion Attempt; [1
9,3092015/01/20 2011947  ET WEB_SPECIFIC_APPS GeekLog filemgt UPDATE SET SQL Injection Attempt; [1
9,3082015/01/20 2011946  ET WEB_SPECIFIC_APPS GeekLog filemgt INSERT INTO SQL Injection Attempt; [1
9,3072015/01/20 2011945  ET WEB_SPECIFIC_APPS GeekLog filemgt UNION SELECT SQL Injection Attempt; [1
9,3062015/01/20 2011944  ET WEB_SPECIFIC_APPS GeekLog filemgt DELETE FROM SQL Injection Attempt; [1
9,3052015/01/20 2011943  ET WEB_SPECIFIC_APPS GeekLog filemgt SELECT FROM SQL Injection Attempt; [1
9,3042015/01/20 2011942  ET WEB_SPECIFIC_APPS WordPress Vodpod Video Gallery Plugin gid Cross-Site Scripting Attempt; [1
9,3032015/01/20 2011941  ET WEB_SPECIFIC_APPS Open Source Support Ticket System module.php Local File Inclusion Attempt; [1
9,3022015/01/20 2011940  ET WEB_SPECIFIC_APPS PossibleFreeNAS exec_raw.php Arbitrary Command Execution Attempt;  
9,3012015/01/20 2011939  ET MALWARE CryptMEN HTTP library purporting to be MSIE to PHP HTTP 1.1;  
9,3002015/01/20 2011938  ET MALWARE CryptMEN HTTP library purporting to be MSIE to PHP HTTP 1.0;  
9,2992015/01/20 2011936  ET WEB_SPECIFIC_APPS Dolphin BxDolGzip.php file Disclosure Attempt; [1,2
9,2982015/01/20 2011935  ET WEB_SPECIFIC_APPS Joomla Component joomlaXplorer admin.joomlaxplorer.php File Inclusion Attempt; [1
9,2972015/01/20 2011934  ET WEB_SPECIFIC_APPS Interactive Web Solutions site_info.php UPDATE SET SQL Injection Attempt; [1
9,2962015/01/20 2011933  ET WEB_SPECIFIC_APPS Interactive Web Solutions site_info.php INSERT INTO SQL Injection Attempt; [1
9,2952015/01/20 2011932  ET WEB_SPECIFIC_APPS Interactive Web Solutions site_info.php UNION SELECT SQL Injection Attempt; [1
9,2942015/01/20 2011931  ET WEB_SPECIFIC_APPS Interactive Web Solutions site_info.php DELETE FROM SQL Injection Attempt; [1
9,2932015/01/20 2011930  ET WEB_SPECIFIC_APPS Interactive Web Solutions site_info.php SELECT FROM SQL Injection Attempt; [1
9,2922015/01/20 2011929  ET WEB_SPECIFIC_APPS Joomla Component com_banners banners.class.php Remote File inclusion Attempt; [1
9,2912015/01/20 2011928  ET WEB_SPECIFIC_APPS TFTgallery adminlangfile Parameter Local File inclusion Attempt; [1
9,2902015/01/20 2011927  ET WEB_SPECIFIC_APPS SiteloomCMS mailform_1 variable Cross Site Scripting Attempt; [1
9,2892015/01/20 2011926  ET TROJAN X-Tag Zeus Mitmo user agent; [1
9,2882015/01/20 2011925  ET TROJAN Rogue AV Downloader concat URI; [1
9,2872015/01/20 2011924  ET SCAN Havij SQL Injection Tool User-Agent Outbound; [1
9,2862015/01/20 2011923  ET DELETED FAKEAV CryptMEN inst.exe Payload Download;  
9,2852015/01/20 2011922  ET TROJAN FAKEAV CryptMEN - Random Named DeObfuscation JavaScript File Download;  
9,2842015/01/20 2011921  ET TROJAN FAKEAV CryptMEN - Landing Page Download Contains .hdd_icon;  
9,2832015/01/20 2011920  ET DELETED FAKEAV CryptMEN - 302 Redirect;  
9,2822015/01/20 2011919  ET DELETED FAKEAV Gemini - packupdate*.exe download;  
9,2812015/01/20 2011918  ET DELETED FAKEAV Gemini - JavaScript Redirection To FakeAV Binary;  
9,2802015/01/20 2011917  ET TROJAN FAKEAV Gemini - JavaScript Redirection To Scanning Page;  
9,2792015/01/20 2011916  ET DELETED SEO/Malvertising Executable Landing exe2.php;  
9,2782015/01/20 2011915  ET SCAN DotDotPwn User-Agent; [1
9,2772015/01/20 2011914  ET SCAN DirBuster Scan in Progress; [1
9,2762015/01/20 2011912  ET TROJAN Possible Fake AV Checkin;  
9,2752015/01/20 2011911  ET DNS Hiloti DNS CnC Channel Successful Install Message; [1,2
9,2742015/01/20 2011910  ET WEB_CLIENT Possible Adobe Reader 9.4 this.printSeps Memory Corruption Attempt;  
9,2732015/01/20 2011909  ET DELETED trojan renos Flash.HD.exe;  
9,2722015/01/20 2011908  ET DELETED exploit kit x/exe.php?x=mdac;  
9,2712015/01/20 2011907  ET DELETED exploit kit x/l.php?s=dexc;  
9,2702015/01/20 2011906  ET CURRENT_EVENTS exploit kit x/load/svchost.exe;  
9,2692015/01/20 2011905  ET DELETED exploit kit x/index.php?s=dexc;  
9,2682015/01/20 2011904  ET DELETED fast flux rogue antivirus download.php?id=2004;  
9,2672015/01/20 2011903  ET DELETED iframe Phoenix Exploit & ZBot vt073pd/photo.exe;  
9,2662015/01/20 2011902  ET DELETED Phishing ~mbscom/moneybookers/app/login/login.html;  
9,2652015/01/20 2011901  ET DELETED Hacked server to exploits ~rio1/admin/login.php;  
9,2642015/01/20 2011900  ET DELETED Trojandropper dunik!rts xxx/download7/21/install_flash_player.exe;  
9,2632015/01/20 2011899  ET DELETED Trojan perflogger ~duydati/inst_PCvw.exe;  
9,2622015/01/20 2011898  ET DELETED Rogue antivirus downloader x/l.php?id=RdxUVjSVVKicADPtx=6666os=5.1n=1;  
< 351  352  353  354  355  356  357  358  359  360 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.