시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
10,9612015/01/20 2013721  ET TROJAN Suspicious User-Agent (WindowsNT) With No Separating Space;  
10,9602015/01/20 2013720  ET TROJAN Win32/Wapomi.AD Variant Checkin;  
10,9592015/01/20 2013719  ET POLICY GridinSoft.com Software Version Check;  
10,9582015/01/20 2013718  ET USER_AGENTS Trojan Downloader User-Agent (Tiny);  
10,9572015/01/20 2013717  ET USER_AGENTS Trojan Downloader User-Agent BGroom;  
10,9562015/01/20 2013716  ET DELETED W32/Parite CnC Checkin;  
10,9552015/01/20 2013715  ET POLICY BingBar ToolBar User-Agent (BingBar);  
10,9542015/01/20 2013714  ET DELETED Win32/Spy.Lpxenur Checkin;  
10,9532015/01/20 2013713  ET WEB_SPECIFIC_APPS Joostina CMS users component Blind SQL Injection Attempt; [1
10,9522015/01/20 2013712  ET WEB_SPECIFIC_APPS TinyWebGallery install_path parameter Local File Inclusion Attempt; [1
10,9512015/01/20 2013711  ET WEB_SPECIFIC_APPS TinyWebGallery workaround_dir parameter Local File Inclusion Attempt; [1
10,9502015/01/20 2013710  ET POLICY FreeRide Games Some AVs report as TrojWare.Win32.Trojan.Agent.Gen; [1
10,9492015/01/20 2013709  ET WEB_SPECIFIC_APPS WordPress Annonces Remote File inclusion Attempt; [1
10,9482015/01/20 2013708  ET WEB_SPECIFIC_APPS Mambo N-Myndir UPDATE SET SQL Injection Attempt; [1
10,9472015/01/20 2013707  ET WEB_SPECIFIC_APPS Mambo N-Myndir INSERT INTO SQL Injection Attempt; [1
10,9462015/01/20 2013706  ET WEB_SPECIFIC_APPS Mambo N-Myndir UNION SELECT SQL Injection Attempt; [1
10,9452015/01/20 2013705  ET WEB_SPECIFIC_APPS Mambo N-Myndir DELETE FROM SQL Injection Attempt; [1
10,9442015/01/20 2013704  ET WEB_SPECIFIC_APPS Mambo N-Myndir SELECT FROM SQL Injection Attempt; [1
10,9432015/01/20 2013703  ET INFO Suspicious Self Signed SSL Certificate to 'My Company Ltd';  
10,9422015/01/20 2013702  ET TROJAN Trojan Downloader User-Agent (NOPE); [1,2
10,9412015/01/20 2013701  ET TROJAN Agent-TMF Checkin;  
10,9402015/01/20 2013700  ET CURRENT_EVENTS Blackhole landing page with malicious Java applet;  
10,9392015/01/20 2013699  ET CURRENT_EVENTS Unknown Java Exploit Kit applet landing;  
10,9382015/01/20 2013698  ET CURRENT_EVENTS Unknown Java Exploit Kit lo2.jar;  
10,9372015/01/20 2013697  ET CURRENT_EVENTS Unknown Java Exploit Kit lo.class;  
10,9362015/01/20 2013696  ET CURRENT_EVENTS Unknown Java Exploit Kit x.jar?o=;  
10,9352015/01/20 2013695  ET DELETED Unknown Java Exploit Kit cc exploit progress status cookie;  
10,9342015/01/20 2013694  ET MOBILE_MALWARE Android/Netisend.A Posting Information to CnC; [1
10,9332015/01/20 2013693  ET CURRENT_EVENTS Unknown Exploit Kit request for pdf_err__Error__Unspecified;  
10,9322015/01/20 2013692  ET CURRENT_EVENTS Unknown Exploit Kit Java requesting malicious EXE;  
10,9312015/01/20 2013691  ET CURRENT_EVENTS Unknown Exploit Kit Java requesting malicious JAR;  
10,9302015/01/20 2013690  ET CURRENT_EVENTS Unknown Exploit Kit reporting Java and PDF state;  
10,9292015/01/20 2013688  ET TROJAN Shylock Module Server Response; [1,2
10,9282015/01/20 2013687  ET TROJAN Shylock Module Data POST; [1,2
10,9272015/01/20 2013686  ET TROJAN ZeroAccess/Max Rootkit C&C Activity 2; [1,2,3
10,9262015/01/20 2013685  ET TROJAN ZeroAccess/Max Rootkit C&C Activity 1; [1,2,3
10,9252015/01/20 2013684  ET INFO HTTP Request to a *.dtdns.net domain;  
10,9242015/01/20 2013683  ET TROJAN Win32.Parite Checkin SQL Database; [1
10,9232015/01/20 2013682  ET WEB_SPECIFIC_APPS Simplis CMS download_file Parameter Local File Inclusion Attempt; [1
10,9222015/01/20 2013681  ET WEB_SPECIFIC_APPS American Bankers Association Cross Site Scripting Attempt; [1
10,9212015/01/20 2013680  ET WEB_SPECIFIC_APPS Joomla EZ Realty id Parameter Blind SQL Injection Attempt; [1
10,9202015/01/20 2013679  ET WEB_SPECIFIC_APPS BbZL.PhP lien_2 Parameter Remote File Inclusion Attempt; [1
10,9192015/01/20 2013678  ET WEB_SPECIFIC_APPS Joomla Component com_jr_questionnaire Directory Traversal Attempt; [1
10,9182015/01/20 2013677  ET WEB_SPECIFIC_APPS WordPress Tune Library Plugin letter parameter UPDATE SET SQL Injection Attempt;  
10,9172015/01/20 2013676  ET WEB_SPECIFIC_APPS WordPress Tune Library Plugin letter parameter INSERT INTO SQL Injection Attempt;  
10,9162015/01/20 2013675  ET WEB_SPECIFIC_APPS WordPress Tune Library Plugin letter parameter UNION SELECT SQL Injection Attempt;  
10,9152015/01/20 2013674  ET WEB_SPECIFIC_APPS WordPress Tune Library Plugin letter parameter DELETE FROM SQL Injection Attempt;  
10,9142015/01/20 2013673  ET WEB_SPECIFIC_APPS WordPress Tune Library Plugin letter parameter SELECT FROM SQL Injection Attempt;  
10,9132015/01/20 2013672  ET TROJAN Win32.Riberow.A (postit3); [1
10,9122015/01/20 2013671  ET TROJAN Win32.Riberow.A (touch); [1
< 321  322  323  324  325  326  327  328  329  330 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.