시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
6,7612015/01/20 2008974  ET MALWARE User-Agent (Mozilla/4.0 (compatible)); [1
6,7602015/01/20 2008973  ET TROJAN onmuz.com Infection Activity; [1
6,7592015/01/20 2008972  ET TROJAN Pointfree.co.kr Trojan/Spyware Infection Checkin; [1
6,7582015/01/20 2008970  ET WEB_SPECIFIC_APPS ccTiddly workspace.php cct_base parameter Remote File Inclusion; [1,2,3
6,7572015/01/20 2008969  ET WEB_SPECIFIC_APPS ccTiddly include.php cct_base parameter Remote File Inclusion; [1,2,3
6,7562015/01/20 2008968  ET WEB_SPECIFIC_APPS ccTiddly header.php cct_base parameter Remote File Inclusion; [1,2,3
6,7552015/01/20 2008967  ET WEB_SPECIFIC_APPS ccTiddly proxy.php cct_base parameter Remote File Inclusion; [1,2,3
6,7542015/01/20 2008966  ET WEB_SPECIFIC_APPS ccTiddly index.php cct_base parameter Remote File Inclusion; [1,2,3
6,7532015/01/20 2008965  ET WEB_SPECIFIC_APPS lcxBBportal Alpha acp_lcxbbportal.php phpbb_root_path parameter Remote File Inclusion; [1,2
6,7522015/01/20 2008964  ET WEB_SPECIFIC_APPS lcxBBportal Alpha portal_block.php phpbb_root_path parameter Remote File Inclusion; [1,2
6,7512015/01/20 2008963  ET ACTIVEX EasyMail Objects emmailstore.dll ActiveX Control Remote Buffer Overflow; [1,2
6,7502015/01/20 2008962  ET WEB_SPECIFIC_APPS PHPmyGallery confdir parameter Remote File Inclusion; [1,2
6,7492015/01/20 2008961  ET WEB_SPECIFIC_APPS PHPmyGallery lang parameter Local File Inclusion; [1,2
6,7482015/01/20 2008958  ET TROJAN Waledac Beacon Traffic Detected; [1,2
6,7472015/01/20 2008956  ET TROJAN Suspicious User-Agent (IE/1.0); [1
6,7462015/01/20 2008955  ET TROJAN Mac User-Agent Typo INBOUND Likely Hostile; [1
6,7452015/01/20 2008954  ET DELETED Mac User-Agent Typo Likely Hostile/Trojan Infection; [1
6,7442015/01/20 2008953  ET ATTACK_RESPONSE Possible MS CMD Shell opened on local system; [1
6,7432015/01/20 2008952  ET TROJAN Win32.Small.yml or Related HTTP Command; [1
6,7422015/01/20 2008951  ET TROJAN Trojan.Win32.Small.yml client command; [1
6,7412015/01/20 2008950  ET TROJAN Trojan.Win32.Small.yml client registration; [1
6,7402015/01/20 2008949  ET TROJAN Win32.Small.yml or Related HTTP Checkin; [1
6,7392015/01/20 2008947  ET TROJAN UpackbyDwing binary in HTTP (2) Possibly Hostile; [1,2
6,7382015/01/20 2008946  ET TROJAN UpackbyDwing binary in HTTP Download Possibly Hostile; [1,2
6,7372015/01/20 2008945  ET TROJAN dlink router access attempt; [1
6,7362015/01/20 2008944  ET TROJAN TDSServ or Tidserv variant Checkin; [1,2
6,7352015/01/20 2008943  ET TROJAN Lop_com or variant Checkin (9kgen_up); [1,2
6,7342015/01/20 2008942  ET POLICY Dlink Soho Router Config Page Access Attempt; [1
6,7332015/01/20 2008941  ET TROJAN Suspicious User-Agent (HELLO); [1
6,7322015/01/20 2008940  ET TROJAN DNSChanger.AT or related Infection Checkin Post; [1
6,7312015/01/20 2008939  ET WEB_SPECIFIC_APPS Wbstreet show.php id parameter Remote SQL Injection; [1,2
6,7302015/01/20 2008938  ET WEB_SPECIFIC_APPS Multi SEO phpBB pfad parameter local file inclusion; [1,2,3
6,7292015/01/20 2008937  ET WEB_SPECIFIC_APPS gravity-gtd rpc.php objectname parameter Local File Inclusion; [1,2,3
6,7282015/01/20 2008936  ET WEB_SPECIFIC_APPS ASPApps.com Template Creature media_level.asp mcatid parameter SQL Injection; [1,2
6,7272015/01/20 2008935  ET WEB_SPECIFIC_APPS Werner Hilversum FAQ Manager header.php config_path parameter Remote File Inclusion; [1,2
6,7262015/01/20 2008934  ET WEB_SPECIFIC_APPS Turnkey Arcade Script id parameter SQL injection; [1,2,3
6,7252015/01/20 2008933  ET WEB_SPECIFIC_APPS Check New findoffice.php search parameter Remote SQL Injection; [1,2
6,7242015/01/20 2008932  ET WEB_SPECIFIC_APPS SunByte e-Flower popupproduct.php id Parameter SQL Injection; [1,2
6,7232015/01/20 2008931  ET WEB_SPECIFIC_APPS Experts answer.php question_id parameter SQL Injection; [1,2
6,7222015/01/20 2008930  ET WEB_SPECIFIC_APPS ParsBlogger blog.asp wr parameter Remote SQL Injection; [1,2
6,7212015/01/20 2008929  ET WEB_SPECIFIC_APPS bcoos adresses module viewcat.php cid Parameter SQL injection; [1,2,3
6,7202015/01/20 2008928  ET WEB_SPECIFIC_APPS z1exchange edit.php site parameter SQL injection; [1,2
6,7192015/01/20 2008927  ET WEB_SPECIFIC_APPS Lito Lite CMS cate.php cid parameter Remote SQL Injection; [1,2,3
6,7182015/01/20 2008926  ET WEB_SPECIFIC_APPS Venalsur Booking Centre HotelID Parameter SQL Injection; [1,2
6,7172015/01/20 2008925  ET ACTIVEX Microsoft Windows Media Services nskey.dll ActiveX Control Possible Remote Buffer Overflow; [1
6,7162015/01/20 2008924  ET WEB_SPECIFIC_APPS Rakhi Software Price Comparison Script product.php subcategory_id SQL Injection; [1,2
6,7152015/01/20 2008923  ET DELETED TxtBlog index.php m Parameter Local File Inclusion; [1,2
6,7142015/01/20 2008922  ET WEB_SPECIFIC_APPS Nitrotech common.php root Parameter Remote File Inclusion; [1,2,3
6,7132015/01/20 2008921  ET WEB_SPECIFIC_APPS Nitrotech members.php id Parameter SQL Injection; [1
6,7122015/01/20 2008920  ET TROJAN Backdoor.Win32/PcClient.ZL Checkin; [1
< 401  402  403  404  405  406  407  408  409  410 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.