시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,8612015/01/20 2012518  ET CURRENT_EVENTS RetroGuard Obfuscated JAR likely part of hostile exploit kit; [1
9,8602015/01/20 2012517  ET TROJAN Win32/Rimecud.B Activity; [1
9,8592015/01/20 2012516  ET DELETED Fake Google Toolbar User-Agent;  
9,8582015/01/20 2012515  ET DELETED Hiloti loader receiving payload URL;  
9,8572015/01/20 2012514  ET TROJAN Hiloti loader requesting payload URL;  
9,8562015/01/20 2012513  ET TROJAN Hiloti loader installed successfully request;  
9,8552015/01/20 2012512  ET TROJAN Hiloti loader installed successfully response;  
9,8542015/01/20 2012511  ET WEB_CLIENT Opera Window.Open document.cloneNode Null Pointer Deference Attempt; [1
9,8532015/01/20 2012510  ET SHELLCODE UTF-8/16 Encoded Shellcode; [1
9,8522015/01/20 2012509  ET WEB_CLIENT Android Webkit removeChild Use-After-Free Remote Code Execution Attempt;  
9,8512015/01/20 2012508  ET POLICY Akamai NetSession Interface PUTing data; [1
9,8502015/01/20 2012507  ET TROJAN Monkif CnC response in fake JPEG; [1,2,3
9,8492015/01/20 2012506  ET TROJAN Driveby Exploit Attempt Often to Install Monkif;  
9,8482015/01/20 2012505  ET TROJAN Monkif Checkin;  
9,8472015/01/20 2012504  ET CURRENT_EVENTS Excel with Embedded .emf object downloaded;  
9,8462015/01/20 2012503  ET CURRENT_EVENTS Compressed Adobe Flash File Embedded in XLS FILE Caution - Could be Exploit; [1,2
9,8452015/01/20 2012502  ET WEB_SPECIFIC_APPS Constructr CMS SQL Injection Attempt -- constructrXmlOutput.content.xml.php page_id ASCII; [1,2
9,8442015/01/20 2012501  ET WEB_SPECIFIC_APPS Constructr CMS Injection Attempt -- constructrXmlOutput.content.xml.php page_id DELETE; [1,2
9,8432015/01/20 2012500  ET WEB_SPECIFIC_APPS Constructr CMS SQL Injection Attempt -- constructrXmlOutput.content.xml.php page_id INSERT; [1,2
9,8422015/01/20 2012499  ET WEB_SPECIFIC_APPS Constructr CMS SQL Injection Attempt -- constructrXmlOutput.content.xml.php page_id UNION SELECT; [1,2
9,8412015/01/20 2012498  ET WEB_SPECIFIC_APPS Constructr CMS SQL Injection Attempt -- constructrXmlOutput.content.xml.php page_id SELECT; [1,2
9,8402015/01/20 2012497  ET WEB_SPECIFIC_APPS Sahana Agasti dao.php approot Parameter Remote File Inclusion Attempt; [1,2
9,8392015/01/20 2012496  ET WEB_SPECIFIC_APPS Sahana Agasti AccessController.php approot Parameter Remote File Inclusion Attempt; [1,2
9,8382015/01/20 2012495  ET DELETED FakeAV campaign related JavaScript eval document obfuscation;  
9,8372015/01/20 2012494  ET TROJAN FakeAV InstallInternetDefender Download;  
9,8362015/01/20 2012493  ET TROJAN DHL Spam Inbound;  
9,8352015/01/20 2012492  ET TROJAN DHL Spam Inbound;  
9,8342015/01/20 2012491  ET TROJAN Suspicious User-Agent (Presto);  
9,8332015/01/20 2012490  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf UPDATE; [1
9,8322015/01/20 2012489  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf ASCII; [1
9,8312015/01/20 2012488  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf DELETE; [1
9,8302015/01/20 2012487  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf INSERT; [1
9,8292015/01/20 2012486  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf UNION SELECT; [1
9,8282015/01/20 2012485  ET WEB_SPECIFIC_APPS Keynect Ecommerce SQL Injection Attempt -- products.php ctf SELECT; [1
9,8272015/01/20 2012484  ET WEB_SPECIFIC_APPS Wikiwig spell-check-savedicts.php to_r_list Parameter Cross Site Scripting Attempt; [1
9,8262015/01/20 2012483  ET WEB_SPECIFIC_APPS Wikiwig spell-check-savedicts.php to_p_dict Parameter Cross Site Scripting Attempt; [1
9,8252015/01/20 2012482  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id UPDATE; [1
9,8242015/01/20 2012481  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id ASCII; [1
9,8232015/01/20 2012480  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id DELETE; [1
9,8222015/01/20 2012479  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id INSERT; [1
9,8212015/01/20 2012478  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id UNION SELECT; [1
9,8202015/01/20 2012477  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin SQL Injection Attempt -- massedit_album.php gall_id SELECT; [1
9,8192015/01/20 2012476  ET WEB_SPECIFIC_APPS Flash Gallery wordpress plugin folder.php type Parameter Cross Site Scripting Attempt; [1,2
9,8182015/01/20 2012475  ET WEB_SPECIFIC_APPS RecordPress header.php titledesc Parameter Cross Site Scripting Attempt; [1
9,8172015/01/20 2012474  ET WEB_SPECIFIC_APPS RecordPress rp-menu.php sess_user Parameter Cross Site Scripting Attempt; [1
9,8162015/01/20 2012473  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu UPDATE; [1
9,8152015/01/20 2012472  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu ASCII; [1
9,8142015/01/20 2012471  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu DELETE; [1
9,8132015/01/20 2012470  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu INSERT; [1
9,8122015/01/20 2012469  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu UNION SELECT; [1
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.