시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
10,2112015/01/20 2012878  ET WEB_SPECIFIC_APPS e107 IMAGES_DIRECTORY Parameter Remote File inclusion Attempt; [1
10,2102015/01/20 2012877  ET WEB_SPECIFIC_APPS e107 HANDLERS_DIRECTORY Parameter Remote File inclusion Attempt; [1
10,2092015/01/20 2012876  ET WEB_SPECIFIC_APPS TCExam tce_xml_user_results.php script UPDATE SET SQL Injection Attempt; [1
10,2082015/01/20 2012875  ET WEB_SPECIFIC_APPS TCExam tce_xml_user_results.php script INSERT INTO SQL Injection Attempt; [1
10,2072015/01/20 2012874  ET WEB_SPECIFIC_APPS TCExam tce_xml_user_results.php script UNION SELECT SQL Injection Attempt; [1
10,2062015/01/20 2012873  ET WEB_SPECIFIC_APPS TCExam tce_xml_user_results.php script DELETE FROM SQL Injection Attempt; [1
10,2052015/01/20 2012872  ET WEB_SPECIFIC_APPS TCExam tce_xml_user_results.php script SELECT FROM SQL Injection Attempt; [1
10,2042015/01/20 2012871  ET TROJAN Gozi posting form data;  
10,2032015/01/20 2012870  ET POLICY HTTP Outbound Request contains pw;  
10,2022015/01/20 2012869  ET POLICY HTTP Outbound Request containing a pass field;  
10,2012015/01/20 2012868  ET POLICY HTTP Outbound Request containing a password;  
10,2002015/01/20 2012867  ET TROJAN Clicker.Win32.AutoIt.ai Checkin; [1
10,1992015/01/20 2012866  ET EXPLOIT RXS-3211 IP Camera Password Information Disclosure Attempt;  
10,1982015/01/20 2012865  ET TROJAN Vinself Backdoor Checkin; [1
10,1972015/01/20 2012864  ET MOBILE_MALWARE SslCrypt Server Communication; [1
10,1962015/01/20 2012863  ET MOBILE_MALWARE SslCrypt Server Communication; [1
10,1952015/01/20 2012862  ET MOBILE_MALWARE SslCrypt Server Communication; [1
10,1942015/01/20 2012861  ET MOBILE_MALWARE SymbOS.Sagasi.a User Agent LARK/1.3.0; [1
10,1932015/01/20 2012860  ET USER_AGENTS Suspicious User-Agent SimpleClient 1.0; [1
10,1922015/01/20 2012859  ET MOBILE_MALWARE SymbOS.Sagasi.a Worm Sending Data to Server; [1
10,1912015/01/20 2012858  ET MOBILE_MALWARE SymbOS.Sagasi.a Worm Sending Data to Server; [1
10,1902015/01/20 2012857  ET MOBILE_MALWARE SPR/MobileSpy Mobile Spyware Sending SMS Logs to Remote Server; [1
10,1892015/01/20 2012856  ET MOBILE_MALWARE SPR/MobileSpy Mobile Spyware Sending Call Logs to Remote Server; [1
10,1882015/01/20 2012855  ET MOBILE_MALWARE SPR/MobileSpy Mobile Spyware Sending Geographic Location Logs To Remote Server; [1
10,1872015/01/20 2012854  ET MOBILE_MALWARE SymbOS/Merogo User Agent; [1
10,1862015/01/20 2012853  ET MOBILE_MALWARE SymbOS/Yxes.I NumberFile.jsp CnC Server Communication; [1
10,1852015/01/20 2012852  ET MOBILE_MALWARE SymbOS/Yxes.I TipFile.jsp CnC Server Communication; [1
10,1842015/01/20 2012851  ET MOBILE_MALWARE SymbOS/Yxes.I PropertyFile.jsp CnC Server Communication; [1
10,1832015/01/20 2012850  ET MOBILE_MALWARE SymbOS.Flexispy.a Commercial Spying App Sending User Information to Server; [1
10,1822015/01/20 2012849  ET POLICY Possible Mobile Malware POST of IMSI International Mobile Subscriber Identity in URI; [1
10,1812015/01/20 2012848  ET MOBILE_MALWARE Possible Mobile Malware POST of IMEI International Mobile Equipment Identity in URI; [1
10,1802015/01/20 2012847  ET MOBILE_MALWARE SymbOS/Yxes.F CnC Checkin Request 3; [1
10,1792015/01/20 2012846  ET MOBILE_MALWARE SymbOS/Yxes CnC Checkin Request 2; [1
10,1782015/01/20 2012845  ET MOBILE_MALWARE SymbOS/Yxes CnC Checkin Request; [1
10,1772015/01/20 2012844  ET MOBILE_MALWARE SymbOS/Yxes.B/E CnC Checkin Request; [1
10,1762015/01/20 2012843  ET POLICY Cleartext WordPress Login;  
10,1752015/01/20 2012842  ET TROJAN Backdoor.Win32.Xyligan Checkin; [1,2
10,1742015/01/20 2012841  ET TROJAN Incognito Exploit Kit Checkin; [1
10,1732015/01/20 2012839  ET TROJAN Trojan-Downloader.Win32.Small Checkin; [1
10,1722015/01/20 2012838  ET WEB_SPECIFIC_APPS Wordpress Plugin Is-human type Parameter Remote Code Execution Attempt; [1
10,1712015/01/20 2012837  ET WEB_SPECIFIC_APPS Joomla Component com_mgm Remote File inclusion Attempt; [1,2
10,1702015/01/20 2012836  ET WEB_SPECIFIC_APPS Slooze Web Photo Album file Parameter Command Execution Attempt; [1
10,1692015/01/20 2012835  ET WEB_SPECIFIC_APPS f-fileman direkt Parameter Directory Traversal Vulnerability; [1
10,1682015/01/20 2012834  ET WEB_SPECIFIC_APPS ChillyCMS mod Parameter Blind SQL Injection Attempt; [1,2
10,1672015/01/20 2012833  ET WEB_SPECIFIC_APPS Joomla Component com_hello UPDATE SET SQL Injection Attempt; [1
10,1662015/01/20 2012832  ET WEB_SPECIFIC_APPS Joomla Component com_hello INSERT INTO SQL Injection Attempt; [1
10,1652015/01/20 2012831  ET WEB_SPECIFIC_APPS Joomla Component com_hello UNION SELECT SQL Injection Attempt; [1
10,1642015/01/20 2012830  ET WEB_SPECIFIC_APPS Joomla Component com_hello DELETE FROM SQL Injection Attempt; [1
10,1632015/01/20 2012829  ET WEB_SPECIFIC_APPS Joomla Component com_hello SELECT FROM SQL Injection Attempt; [1
10,1622015/01/20 2012828  ET TROJAN Win32/Rimecud download; [1
< 331  332  333  334  335  336  337  338  339  340 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.