시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,4112015/01/20 2010820  ET WEB_SERVER Tilde in URI, potential .cgi source disclosure vulnerability; [1,2
8,4102015/01/20 2010819  ET CHAT Facebook Chat using XMPP; [1,2
8,4092015/01/20 2010818  ET DELETED Possible Cisco ASA 5500 Series Adaptive Security Appliance Remote SIP Inspection Device Reload Denial of Service Attempt; [1,2
8,4082015/01/20 2010817  ET DOS Possible Cisco ASA 5500 Series Adaptive Security Appliance Remote SIP Inspection Device Reload Denial of Service Attempt; [1,2
8,4072015/01/20 2010816  ET POLICY Incoming UDP Packet From Amazon EC2 Cloud; [1
8,4062015/01/20 2010815  ET DELETED Incoming Connection Attempt From Amazon EC2 Cloud; [1
8,4052015/01/20 2010814  ET ACTIVEX Possible AOL 9.5 BindToFile Heap Overflow Attempt; [1,2
8,4042015/01/20 2010813  ET WEB_CLIENT VLC Media Player smb URI Handling Remote Buffer Overflow Attempt; [1,2
8,4032015/01/20 2010809  ET WEB_SPECIFIC_APPS Joomla com_yelp Component cid Parameter UPDATE SET SQL Injection Attempt; [1
8,4022015/01/20 2010808  ET WEB_SPECIFIC_APPS Joomla com_yelp Component cid Parameter INSERT INTO SQL Injection Attempt; [1
8,4012015/01/20 2010807  ET WEB_SPECIFIC_APPS Joomla com_yelp Component cid Parameter UNION SELECT SQL Injection Attempt; [1
8,4002015/01/20 2010806  ET WEB_SPECIFIC_APPS Joomla com_yelp Component cid Parameter DELETE FROM SQL Injection Attempt; [1
8,3992015/01/20 2010805  ET WEB_SPECIFIC_APPS Joomla com_yelp Component cid Parameter SELECT FROM SQL Injection Attempt; [1
8,3982015/01/20 2010804  ET WEB_SPECIFIC_APPS F5 Data Manager ViewInventoryErrorReport.do Local File Inclusion Attempt; [1,2
8,3972015/01/20 2010803  ET WEB_SPECIFIC_APPS F5 Data Manager DiagCaptureFileListActionBody.do capture parameter LFI Attempt; [1,2
8,3962015/01/20 2010802  ET WEB_SPECIFIC_APPS F5 Data Manager ViewSatReport.do Local File Inclusion Attempt; [1,2
8,3952015/01/20 2010801  ET WEB_SPECIFIC_APPS F5 Data Manager DiagCaptureFileListActionBody.do Local File Inclusion Attempt; [1,2
8,3942015/01/20 2010800  ET WEB_SPECIFIC_APPS F5 Data Manager DiagLogListActionBody.do Local File Inclusion Attempt; [1,2
8,3932015/01/20 2010799  ET WEB_CLIENT Possible Internet Explorer srcElement Memory Corruption Attempt; [1,2,3,4
8,3922015/01/20 2010798  ET WEB_CLIENT Possible Microsoft Internet Explorer URI Validation Remote Code Execution Attempt; [1,2
8,3912015/01/20 2010797  ET DELETED Twitter Status Update; [1,2
8,3902015/01/20 2010796  ET DELETED MALWARE Unknown Malware Download Attempt; [1,2
8,3892015/01/20 2010795  ET ATTACK_RESPONSE Matahari client; [1
8,3882015/01/20 2010794  ET WEB_SERVER DFind w00tw00t GET-Requests; [1
8,3872015/01/20 2010791  ET DELETED Bredavi Checkin; [1
8,3862015/01/20 2010790  ET TROJAN Bredavi Configuration Update Response; [1
8,3852015/01/20 2010789  ET DELETED SpyEye Bot Checkin; [1,2,3,4,5
8,3842015/01/20 2010788  ET TROJAN Knockbot Proxy Response From Controller (empty command); [1,2
8,3832015/01/20 2010787  ET TROJAN Knockbot Proxy Response From Controller; [1,2
8,3822015/01/20 2010786  ET CHAT Facebook Chat (settings); [1
8,3812015/01/20 2010785  ET CHAT Facebook Chat (buddy list); [1
8,3802015/01/20 2010784  ET CHAT Facebook Chat (send message); [1
8,3792015/01/20 2010783  ET EXPLOIT GsecDump executed; [1,2
8,3782015/01/20 2010782  ET POLICY RemoteControlX rctrlx service created; [1,2
8,3772015/01/20 2010781  ET POLICY PsExec service created; [1,2
8,3762015/01/20 2010780  ET WEB_SPECIFIC_APPS Joomla mediaslide component viewer.php path Local File Inclusion Attempt; [1
8,3752015/01/20 2010779  ET ACTIVEX HP Mercury Quality Center ActiveX ProgColor Buffer Overflow Attempt -2; [1,2,3,4
8,3742015/01/20 2010778  ET ACTIVEX HP Mercury Quality Center ActiveX ProgColor Buffer Overflow Attempt -1; [1,2,3,4
8,3732015/01/20 2010777  ET WEB_SPECIFIC_APPS asaher pro left_menu.php row_y5_site_configuration Remote File Inclusion Attempt; [1,2
8,3722015/01/20 2010776  ET WEB_SPECIFIC_APPS asaher pro emailsender.php row_y5_site_configuration Remote File Inclusion Attempt; [1,2
8,3712015/01/20 2010775  ET WEB_SPECIFIC_APPS asaher pro downloads.php row_y5_site_configuration Remote File Inclusion Attempt; [1,2
8,3702015/01/20 2010774  ET WEB_SPECIFIC_APPS asaher pro add_comments.php row_y5_site_configuration Remote File Inclusion Attempt; [1,2
8,3692015/01/20 2010773  ET WEB_SPECIFIC_APPS asaher pro view_blog_archives.php Remote File Inclusion Attempt; [1,2
8,3682015/01/20 2010772  ET WEB_SPECIFIC_APPS asaher pro view_blog_comments.php Remote File Inclusion Attempt; [1,2
8,3672015/01/20 2010771  ET WEB_SPECIFIC_APPS asaher pro view_messages.php row_y5_site_configuration Remote File Inclusion Attempt; [1,2
8,3662015/01/20 2010770  ET WEB_SPECIFIC_APPS HP System Management Homepage Input Validation Cross Site Scripting Attempt; [1,2
8,3652015/01/20 2010768  ET SCAN Open-Proxy ScannerBot (webcollage-UA); [1,2,3
8,3642015/01/20 2010767  ET POLICY TRACE Request - outbound; [1
8,3632015/01/20 2010766  ET POLICY Proxy TRACE Request - inbound; [1
8,3622015/01/20 2010765  ET TROJAN Zalupko/Koceg/Mandaph HTTP Checkin (2); [1,2,3,4
< 371  372  373  374  375  376  377  378  379  380 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.