시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
2612015/01/20 2001224  ET MALWARE Regnow.com Gamehouse.com Access; [1,2
2602015/01/20 2001223  ET MALWARE Regnow.com Access; [1,2
2592015/01/20 2001222  ET DELETED Default-homepage-network.com Access; [1,2
2582015/01/20 2001221  ET MALWARE F1Organizer Config Download; [1
2572015/01/20 2001219  ET SCAN Potential SSH Scan; [1,2
2562015/01/20 2001218  ET WEB_SPECIFIC_APPS PHPNuke general XSS attempt; [1,2
2552015/01/20 2001217  ET EXPLOIT Adobe Acrobat Reader Malicious URL Null Byte; [1,2,3
2542015/01/20 2001216  ET MALWARE Twaintec Reporting Data; [1,2
2532015/01/20 2001202  ET WEB_SPECIFIC_APPS PHPNuke general SQL injection attempt; [1,2,3
2522015/01/20 2001199  ET MALWARE Twaintec Ad Retrieval; [1,2
2512015/01/20 2001198  ET MALWARE Twaintec Download Attempt; [1,2
2502015/01/20 2001197  ET WEB_SPECIFIC_APPS PHPNuke SQL injection attempt; [1,2
2492015/01/20 2001195  ET EXPLOIT libPNG - Possible integer overflow in allocation in png_handle_sPLT; [1,2
2482015/01/20 2001192  ET DELETED libPNG - Height exceeds limit; [1,2
2472015/01/20 2001191  ET EXPLOIT libPNG - Width exceeds limit; [1,2
2462015/01/20 2001190  ET DELETED libPNG - Possible NULL-pointer crash in png_handle_iCCP; [1,2
2452015/01/20 2001188  ET P2P Soulseek; [1,2
2442015/01/20 2001187  ET P2P Soulseek Filesearch Results; [1,2
2432015/01/20 2001186  ET P2P Soulseek traffic (2); [1,2
2422015/01/20 2001185  ET P2P Soulseek traffic (1); [1,2
2412015/01/20 2001182  ET WEB_CLIENT IE trojan Ants3set 1.exe - process injection; [1
2402015/01/20 2001181  ET ACTIVEX Internet Explorer Plugin.ocx Heap Overflow; [1,2
2392015/01/20 2001119  ET DNS Standard query response, Refused; [1
2382015/01/20 2001117  ET DNS Standard query response, Name Error; [1
2372015/01/20 2001118  ET DNS Standard query response, Not Implemented; [1
2362015/01/20 2001115  ET POLICY MSI (microsoft installer file) download; [1
2352015/01/20 2001116  ET DNS Standard query response, Format error; [1
2342015/01/20 2001114  ET POLICY Mozilla XPI install files download; [1
2332015/01/20 2001106  ET WEB_CLIENT Javascript execution with expression eval hex; [1,2
2322015/01/20 2001105  ET WEB_CLIENT Javascript execution with expression eval; [1,2
2312015/01/20 2001103  ET WEB_CLIENT Stealth attempt to access SHELL#=#=; [1
2302015/01/20 2001102  ET WEB_CLIENT Stealth attempt to execute VBScript code; [1
2292015/01/20 2001101  ET WEB_CLIENT Stealth attempt to execute Javascript code; [1
2282015/01/20 2001099  ET WEB_CLIENT Attempt to execute VBScript code; [1
2272015/01/20 2001066  ET TROJAN IE Ilookup Trojan; [1,2
2262015/01/20 2001059  ET P2P Ares traffic; [1,2
2252015/01/20 2001058  ET EXPLOIT libpng tRNS overflow attempt; [1
2242015/01/20 2001057  ET DELETED W32/Sasser.worm.a; [1,2
2232015/01/20 2001056  ET DELETED W32/Sasser.worm.b; [1,2
2222015/01/20 2001055  ET MISC HP Web JetAdmin ExecuteFile admin access; [1
2212015/01/20 2001053  ET EXPLOIT NTDump.exe Service Started port 139; [1
2202015/01/20 2001052  ET EXPLOIT NTDump Session Established Reg-Entry port 139; [1
2192015/01/20 2001050  ET MALWARE CometSystems Spyware; [1
2182015/01/20 2001048  ET WEB_CLIENT IE process injection iexplore.exe executable download; [1
2172015/01/20 2001047  ET MALWARE UPX encrypted file download possible malware; [1
2162015/01/20 2001046  ET TROJAN UPX compressed file download possible malware; [1
2152015/01/20 2001044  ET POLICY Yahoo Briefcase Upload; [1
2142015/01/20 2001043  ET DELETED Fun Web Products MyWay Agent Traffic; [1,2
2132015/01/20 2001041  ET MALWARE Casino on Net Install; [1,2
2122015/01/20 2001040  ET DELETED My Search Bar Install; [1,2
< 531  532  533  534  535  536  537  538  539  540 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.