시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1112015/01/20 2000503  ET ATTACK_RESPONSE FTP inaccessible directory access LPT1; [1
1102015/01/20 2000502  ET ATTACK_RESPONSE FTP inaccessible directory access COM4; [1
1092015/01/20 2000500  ET ATTACK_RESPONSE FTP inaccessible directory access COM2; [1
1082015/01/20 2000501  ET ATTACK_RESPONSE FTP inaccessible directory access COM3; [1
1072015/01/20 2000499  ET ATTACK_RESPONSE FTP inaccessible directory access COM1; [1
1062015/01/20 2000489  ET POLICY Download Windows Help File CHM; [1,2,3
1052015/01/20 2000488  ET EXPLOIT MS-SQL SQL Injection closing string plus line comment; [1,2
1042015/01/20 2000466  ET MALWARE User-Agent (iexplore); [1
1032015/01/20 2000429  ET POLICY Download Windows Help File CHM 2; [1,2,3
1022015/01/20 2000428  ET POLICY ZIP file download; [1,2
1012015/01/20 2000427  ET DELETED PE EXE Install Windows file download; [1,2
1002015/01/20 2000426  ET POLICY EXE compressed PKWARE Windows file download; [1,2
992015/01/20 2000425  ET DELETED NE EXE Windows 3.x file download; [1,2
982015/01/20 2000423  ET DELETED NE EXE OS2 file download; [1,2
972015/01/20 2000424  ET DELETED LX EXE OS2 file download; [1,2
962015/01/20 2000422  ET POLICY REG files version 5 Unicode download; [1,2
952015/01/20 2000421  ET POLICY REG files version 5 download; [1,2
942015/01/20 2000420  ET POLICY REG files version 4 download; [1,2
932015/01/20 2000419  ET POLICY PE EXE or DLL Windows file download; [1
922015/01/20 2000418  ET POLICY Executable and linking format (ELF) file download; [1,2
912015/01/20 2000381  ET DELETED EXPLOIT MS-SQL DOS bouncing packets; [1,2
902015/01/20 2000380  ET EXPLOIT MS-SQL Spike buffer overflow; [1
892015/01/20 2000378  ET EXPLOIT MS-SQL DOS attempt (08); [1,2
882015/01/20 2000379  ET EXPLOIT MS-SQL DOS attempt (08) 1 byte; [1,2
872015/01/20 2000377  ET EXPLOIT MS-SQL heap overflow attempt; [1,2
862015/01/20 2000373  ET EXPLOIT MS-SQL SQL Injection line comment; [1,2,3
852015/01/20 2000372  ET EXPLOIT MS-SQL SQL Injection running SQL statements line comment; [1,2,3
842015/01/20 2000371  ET MALWARE Binet (randreco.exe); [1,2
832015/01/20 2000369  ET P2P BitTorrent Announce; [1,2
822015/01/20 2000367  ET MALWARE Binet (set_pix); [1,2
812015/01/20 2000366  ET MALWARE Binet (download complete); [1,2
802015/01/20 2000357  ET P2P BitTorrent Traffic; [1,2
792015/01/20 2000356  ET POLICY IRC connection; [1
782015/01/20 2000352  ET TROJAN IRC DNS request on non-standard port; [1
772015/01/20 2000355  ET CHAT IRC authorization message; [1
762015/01/20 2000351  ET TROJAN IRC Channel join on non-standard port; [1
752015/01/20 2000350  ET TROJAN IRC DCC chat request on non-standard port; [1
742015/01/20 2000349  ET TROJAN IRC DCC file transfer request on non-std port; [1
732015/01/20 2000348  ET TROJAN IRC Channel JOIN on non-standard port; [1
722015/01/20 2000347  ET TROJAN IRC Private message on non-standard port; [1
712015/01/20 2000346  ET DELETED IRC Name response on non-standard port; [1
702015/01/20 2000345  ET TROJAN IRC Nick change on non-standard port; [1
692015/01/20 2000341  ET POLICY Yahoo Mail General Page View; [1
682015/01/20 2000342  ET EXPLOIT Squid NTLM Auth Overflow Exploit; [1,2
672015/01/20 2000340  ET P2P Kaaza Media desktop p2pnetworking.exe Activity; [1,2
662015/01/20 2000339  ET DELETED iroffer IRC Bot offered files advertisement; [1,2
652015/01/20 2000338  ET DELETED iroffer IRC Bot help message; [1,2
642015/01/20 2000337  ET DELETED Yesadvertising Banking Spyware INFORMATION SUBMIT; [1,2
632015/01/20 2000336  ET DELETED Yesadvertising Banking Spyware RETRIEVE; [1,2
622015/01/20 2000335  ET P2P Overnet (Edonkey) Server Announce; [1,2
< 541  542  543
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.