시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,9612015/01/20 2011470  ET TROJAN Daurso FTP Credential Theft Reported; [1,2,3,4
8,9602015/01/20 2011469  ET DELETED MALVERTISING trafficbiztds.com - client receiving redirect to exploit kit;  
8,9592015/01/20 2011468  ET DELETED MALVERTISING trafficbiztds.com - client requesting redirect to exploit kit;  
8,9582015/01/20 2011467  ET WEB_SERVER /bin/ksh In URI Possible Shell Command Execution Attempt;  
8,9572015/01/20 2011466  ET WEB_SERVER /bin/tsh In URI Possible Shell Command Execution Attempt;  
8,9562015/01/20 2011465  ET WEB_SERVER /bin/sh In URI Possible Shell Command Execution Attempt;  
8,9552015/01/20 2011464  ET WEB_SERVER /bin/csh In URI Possible Shell Command Execution Attempt;  
8,9542015/01/20 2011457  ET WEB_CLIENT DLL or EXE File From Possible WebDAV Share, Possible DLL Preloading Exploit Attempt; [1,2,3,4,5,6
8,9532015/01/20 2011456  ET WEB_CLIENT PROPFIND Flowbit Set;  
8,9522015/01/20 2011454  ET WEB_SPECIFIC_APPS 4images global.php db_servertype Parameter Remote File Inclusion Attempt; [1
8,9512015/01/20 2011453  ET WEB_SPECIFIC_APPS PHP-Fusion maincore.php folder_level Parameter Local File Inclusion Attempt; [1
8,9502015/01/20 2011452  ET WEB_SPECIFIC_APPS Dance Studio Manager dailyview.php date Parameter Cross Site Scripting Attempt; [1
8,9492015/01/20 2011451  ET WEB_SPECIFIC_APPS Joomla JGrid Component File Inclusion Attempt; [1,2
8,9482015/01/20 2011450  ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter UPDATE SET SQL Injection Attempt;  
8,9472015/01/20 2011429  ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter INSERT INTO SQL Injection Attempt;  
8,9462015/01/20 2011428  ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter UNION SELECT SQL Injection Attempt;  
8,9452015/01/20 2011427  ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter DELETE FROM SQL Injection Attempt;  
8,9442015/01/20 2011426  ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter SELECT FROM SQL Injection Attempt;  
8,9432015/01/20 2011425  ET DELETED Possible Attempt to Create MSSQL SOAP/HTTP Endpoint in URI to Allow for Operating System Interaction; [1
8,9422015/01/20 2011424  ET WEB_SERVER Possible SQL Injection Using MSSQL sp_configure Command; [1,2
8,9412015/01/20 2011423  ET WEB_SPECIFIC_APPS Cacti cacti/utilities.php Cross Site Scripting Attempt;  
8,9402015/01/20 2011422  ET VOIP Possible Modified Sipvicious OPTIONS Scan; [1,2
8,9392015/01/20 2011421  ET DELETED FAKEAV redirecting to fake scanner page - /?777;  
8,9382015/01/20 2011420  ET TROJAN FAKEAV client requesting image - sector.hdd.png;  
8,9372015/01/20 2011419  ET TROJAN FAKEAV landing page - sector.hdd.png no-repeat;  
8,9362015/01/20 2011417  ET DELETED MALVERTISING Hidden iframe Redirecting to SEO Driveby Site;  
8,9352015/01/20 2011416  ET DELETED General Trojan FakeAV Downloader;  
8,9342015/01/20 2011415  ET DELETED General Trojan Downloader Request Observed; [1,2,3
8,9332015/01/20 2011414  ET TROJAN Win32/Small.gen!AQ Communication with Controller; [1,2,3
8,9322015/01/20 2011413  ET WEB_SPECIFIC_APPS Group Office json.php fingerprint Parameter Remote Command Execution Attempt; [1
8,9312015/01/20 2011412  ET ACTIVEX Apple QuickTime _Marshaled_pUnk Backdoor Param Arbitrary Code Execution Attempt; [1
8,9302015/01/20 2011411  ET DNS DNS Query for Suspicious .co.kr Domain; [1
8,9292015/01/20 2011410  ET DNS DNS Query for Suspicious .cz.cc Domain; [1
8,9282015/01/20 2011409  ET DNS DNS Query for Suspicious .co.cc Domain; [1
8,9272015/01/20 2011408  ET DNS DNS Query for Suspicious .com.cn Domain; [1
8,9262015/01/20 2011407  ET DNS DNS Query for Suspicious .com.ru Domain; [1
8,9252015/01/20 2011403  ET TROJAN Yoyo-DDoS Bot HTTP Flood Attack Outbound; [1
8,9242015/01/20 2011402  ET TROJAN Yoyo-DDoS Bot HTTP Flood Attack Inbound; [1
8,9232015/01/20 2011401  ET DELETED Yoyo-DDoS Bot Unknown Command From CnC Server; [1
8,9222015/01/20 2011400  ET TROJAN Yoyo-DDoS Bot Execute SYN Flood Command Message From CnC Server; [1
8,9212015/01/20 2011399  ET TROJAN Yoyo-DDoS Bot Download and Launch Executable Message From CnC Server; [1
8,9202015/01/20 2011398  ET TROJAN Yoyo-DDoS Bot Execute DDoS Command From CnC Server; [1
8,9192015/01/20 2011397  ET TROJAN FakeYak or Related Infection Checkin 2; [1
8,9182015/01/20 2011396  ET TROJAN FakeYak or Related Infection Checkin 1; [1
8,9172015/01/20 2011395  ET TROJAN wisp backdoor detected reporting;  
8,9162015/01/20 2011393  ET MALWARE User-Agent (Microsoft Internet Explorer 6.0) Possible Reverse Web Shell;  
8,9152015/01/20 2011392  ET MALWARE User-Agent (http-get-demo) Possible Reverse Web Shell;  
8,9142015/01/20 2011391  ET MALWARE web shell detected;  
8,9132015/01/20 2011390  ET SCAN Nikto Scan Remote File Include Retrieval; [1
8,9122015/01/20 2011389  ET SCAN w3af Scan Remote File Include Retrieval; [1
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.