시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,2612015/01/20 2011897  ET DELETED vb exploits / trojan vietshow;  
9,2602015/01/20 2011896  ET DELETED ZBot sp107fb/photo.exe;  
9,2592015/01/20 2011895  ET DELETED Driveby leads to exploits aaitsol1/networks.php;  
9,2582015/01/20 2011894  ET TROJAN TDSS/TDL/Alureon MBR rootkit Checkin;  
9,2572015/01/20 2011893  ET WEB_CLIENT Firefox Interleaving document.write and appendChild Overflow (POC SPECIFIC); [1,2
9,2562015/01/20 2011892  ET WEB_CLIENT Microsoft IE CSS Clip Attribute Memory Corruption (POC SPECIFIC); [1,2,3,4,5
9,2552015/01/20 2011891  ET WEB_CLIENT Possible Microsoft Internet Explorer CSS Tags Remote Code Execution Attempt;  
9,2542015/01/20 2011890  ET DELETED Potential TDSS HTTP Library GET;  
9,2532015/01/20 2011889  ET DELETED HP Data Protector Media Operations SignInName Parameter Overflow; [1,2
9,2522015/01/20 2011887  ET SCAN Medusa User-Agent; [1
9,2512015/01/20 2011886  ET WEB_SPECIFIC_APPS Webspell wCMS-Clanscript staticID Parameter SQL Injection Attempt; [1
9,2502015/01/20 2011884  ET WEB_SPECIFIC_APPS iGaming CMS loadplugin.php load Parameter Local File inclusion Attempt; [1
9,2492015/01/20 2011883  ET WEB_SPECIFIC_APPS Open Web Analytics owa_do Parameter Local File inclusion Attempt; [1
9,2482015/01/20 2011882  ET WEB_SPECIFIC_APPS Open Web Analytics owa_action Parameter Local File inclusion Attempt; [1
9,2472015/01/20 2011881  ET WEB_SPECIFIC_APPS Open Web Analytics mw_plugin.php IP Parameter Remote File inclusion Attempt; [1
9,2462015/01/20 2011880  ET WEB_SPECIFIC_APPS phpBazar picturelib.php Remote File inclusion Attempt; [1
9,2452015/01/20 2011879  ET WEB_SPECIFIC_APPS DBHcms editmenu Parameter UPDATE SET SQL Injection Attempt; [1
9,2442015/01/20 2011878  ET WEB_SPECIFIC_APPS DBHcms editmenu Parameter INSERT INTO SQL Injection Attempt; [1
9,2432015/01/20 2011877  ET WEB_SPECIFIC_APPS DBHcms editmenu Parameter UNION SELECT SQL Injection Attempt; [1
9,2422015/01/20 2011876  ET WEB_SPECIFIC_APPS DBHcms editmenu Parameter DELETE FROM SQL Injection Attempt; [1
9,2412015/01/20 2011875  ET WEB_SPECIFIC_APPS DBHcms editmenu Parameter SELECT FROM SQL Injection Attempt; [1
9,2402015/01/20 2011874  ET POLICY NSPlayer User-Agent Windows Media Player streaming detected; [1
9,2392015/01/20 2011873  ET DELETED Suspicious HTTP GET to JPG with query string;  
9,2382015/01/20 2011872  ET MALWARE User-Agent (Gbot);  
9,2372015/01/20 2011871  ET POLICY SubmitToTDWTF.asmx DailyWTF Potential Source Code Leakage; [1,2
9,2362015/01/20 2011870  ET ACTIVEX Softek Barcode Reader Toolkit ActiveX Control Format String Function Call; [1
9,2352015/01/20 2011869  ET ACTIVEX Softek Barcode Reader Toolkit ActiveX Control Buffer Overflow Attempt; [1
9,2342015/01/20 2011868  ET WEB_CLIENT Possible Javascript obfuscation using app.setTimeOut in PDF in Order to Run Code; [1,2
9,2332015/01/20 2011867  ET ACTIVEX Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Attempt; [1
9,2322015/01/20 2011866  ET WEB_CLIENT Suspicious Embedded Shockwave Flash In PDF;  
9,2312015/01/20 2011865  ET WEB_CLIENT Embedded Executable File in PDF - This Program Cannot Be Run in DOS Mode;  
9,2302015/01/20 2011864  ET WEB_CLIENT Possible Oracle Java APPLET Tag Children Property Memory Corruption Attempt; [1,2
9,2292015/01/20 2011863  ET DELETED Feodo Banking Trojan Receiving Configuration File; [1
9,2282015/01/20 2011862  ET TROJAN Feodo Banking Trojan Account Details Post; [1
9,2272015/01/20 2011861  ET TROJAN Bredolab CnC URL Detected; [1
9,2262015/01/20 2011860  ET WEB_SPECIFIC_APPS Oracle Fusion Middleware BPEL Console Cross Site Scripting;  
9,2252015/01/20 2011858  ET TROJAN Likely Hostile HTTP Header GET structure;  
9,2242015/01/20 2011857  ET TROJAN SpyEye C&C Check-in URI; [1,2
9,2232015/01/20 2011856  ET MALWARE HTML.Psyme.Gen Reporting; [1
9,2222015/01/20 2011855  ET POLICY Java JAR Download Attempt; [1
9,2212015/01/20 2011854  ET POLICY Java JAR file download;  
9,2202015/01/20 2011853  ET WEB_SPECIFIC_APPS W-Agora search.php bn Parameter Local File Inclusion Attempt;  
9,2192015/01/20 2011852  ET WEB_SPECIFIC_APPS W-Agora search.php bn Parameter Cross Site Scripting Attempt;  
9,2182015/01/20 2011851  ET TROJAN Carberp CnC Reply no tasks;  
9,2172015/01/20 2011850  ET TROJAN Carberp file download;  
9,2162015/01/20 2011849  ET TROJAN Win32/Comotor.A!dll Reporting 2; [1,2
9,2152015/01/20 2011848  ET TROJAN Win32/Comotor.A!dll Reporting 1; [1,2
9,2142015/01/20 2011847  ET WEB_SPECIFIC_APPS Joomla com_jomestate Parameter Remote File Inclusion Attempt; [1
9,2132015/01/20 2011846  ET WEB_SPECIFIC_APPS OrangeHRM uri Parameter Local File Inclusion Attempt; [1
9,2122015/01/20 2011845  ET WEB_SPECIFIC_APPS Lantern CMS intPassedLocationID Parameter Cross Site Scripting Attempt;  
< 351  352  353  354  355  356  357  358  359  360 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.