시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,8112015/01/20 2012468  ET WEB_SPECIFIC_APPS All In One Control Panel SQL Injection Attempt -- cp_menu_data_file.php menu SELECT; [1
9,8102015/01/20 2012467  ET P2P Ocelot BitTorrent Server in Use;  
9,8092015/01/20 2012466  ET DELETED Possible JKDDOS download b.exe; [1
9,8082015/01/20 2012461  ET TROJAN Possible JKDDOS download cl.exe; [1
9,8072015/01/20 2012460  ET TROJAN Possible JKDDOS download wm.exe; [1
9,8062015/01/20 2012459  ET TROJAN Possible JKDDOS download 1691.exe; [1
9,8052015/01/20 2012458  ET TROJAN Possible JKDDOS download desyms.exe; [1
9,8042015/01/20 2012457  ET TROJAN Possible JKDDOS download ddos.exe; [1
9,8032015/01/20 2012456  ET TROJAN Possible JKDDOS download 500.exe; [1
9,8022015/01/20 2012455  ET MOBILE_MALWARE Android Trojan Fake10086 checkin 2; [1
9,8012015/01/20 2012454  ET MOBILE_MALWARE Android Trojan Fake10086 checkin 1; [1
9,8002015/01/20 2012453  ET MOBILE_MALWARE Android Trojan DroidDream Command and Control Communication; [1
9,7992015/01/20 2012452  ET MOBILE_MALWARE Android Trojan MSO.PJApps checkin 2; [1
9,7982015/01/20 2012451  ET MOBILE_MALWARE Android Trojan MSO.PJApps checkin 1; [1
9,7972015/01/20 2012450  ET DELETED Android Trojan HongTouTou Command and Control Communication; [1
9,7962015/01/20 2012449  ET TROJAN Downloader Win32.Agent.FakeAV.AVG 2; [1
9,7952015/01/20 2012448  ET TROJAN Downloader Win32.Agent.FakeAV.AVG 1; [1
9,7942015/01/20 2012447  ET DELETED Possible Fast Flux Rogue Antivirus; [1
9,7932015/01/20 2012446  ET TROJAN Possible Eleonore Exploit pack download; [1
9,7922015/01/20 2012445  ET TROJAN Post Express Inbound bad attachment;  
9,7912015/01/20 2012444  ET TROJAN UPS Inbound bad attachment v.6;  
9,7902015/01/20 2012443  ET TROJAN UPS Inbound bad attachment v.5;  
9,7892015/01/20 2012442  ET DELETED UPS Inbound bad attachment v.4;  
9,7882015/01/20 2012441  ET TROJAN Downloader.Win32.Banload Reporting; [1,2
9,7872015/01/20 2012440  ET TROJAN Downloader.Win32.Agent.bqkb Reporting; [1,2
9,7862015/01/20 2012439  ET TROJAN Win32.Vilsel.akd Reporting; [1
9,7852015/01/20 2012438  ET TROJAN TrojanDownloader Win32/Harnig.gen-P Reporting; [1
9,7842015/01/20 2012437  ET WEB_SPECIFIC_APPS WordPress Zotpress citation Parameter Cross Site Scripting Attempt; [1
9,7832015/01/20 2012436  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic UPDATE; [1
9,7822015/01/20 2012435  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic ASCII; [1
9,7812015/01/20 2012434  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic DELETE; [1
9,7802015/01/20 2012433  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic INSERT; [1
9,7792015/01/20 2012432  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic UNION SELECT; [1
9,7782015/01/20 2012431  ET WEB_SPECIFIC_APPS WP Forum Server wordpress plugin SQL Injection Attempt -- feed.php topic SELECT; [1
9,7772015/01/20 2012430  ET WEB_SPECIFIC_APPS Joomla XCloner Component index2.php mosmsg Parameter Cross Site Scripting Attempt; [1
9,7762015/01/20 2012429  ET WEB_SPECIFIC_APPS WordPress XCloner Plugin index2.php mosmsg Parameter Cross Site Scripting Attempt; [1
9,7752015/01/20 2012428  ET WEB_SPECIFIC_APPS WordPress XCloner Plugin index2.php option Parameter Cross Site Scripting Attempt; [1
9,7742015/01/20 2012427  ET WEB_SPECIFIC_APPS Joomla XCloner Component cloner.cron.php config Parameter Local File Inclusion Attempt; [1
9,7732015/01/20 2012426  ET WEB_SPECIFIC_APPS WordPress XCloner Plugin cloner.cron.php config Parameter Local File Inclusion Attempt; [1
9,7722015/01/20 2012425  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt -- dsp_page.cfm pageid UPDATE; [1,2,3
9,7712015/01/20 2012424  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt -- dsp_page.cfm pageid ASCII; [1,2,3
9,7702015/01/20 2012423  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt -- dsp_page.cfm pageid DELETE; [1,2,3
9,7692015/01/20 2012422  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt -- dsp_page.cfm pageid INSERT; [1,2,3
9,7682015/01/20 2012421  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt -- dsp_page.cfm pageid UNION SELECT; [1,2,3
9,7672015/01/20 2012420  ET WEB_SPECIFIC_APPS SOPHIA CMS SQL Injection Attempt dsp_page.cfm pageid SELECT; [1,2,3
9,7662015/01/20 2012419  ET WEB_SPECIFIC_APPS PhreeBooks js_include.php form Parameter Cross Site Scripting Attempt 2; [1,2
9,7652015/01/20 2012418  ET WEB_SPECIFIC_APPS PhreeBooks js_include.php form Parameter Cross Site Scripting Attempt 1; [1,2
9,7642015/01/20 2012417  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id UPDATE; [1,2
9,7632015/01/20 2012416  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id ASCII; [1,2
9,7622015/01/20 2012415  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id DELETE; [1,2
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.