시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1612015/01/20 2000599  ET MALWARE Fun Web Products Install; [1,2
1602015/01/20 2000598  ET DELETED Altnet PeerPoints Manager Data Submission; [1,2
1592015/01/20 2000597  ET MALWARE Gator New Code Download; [1,2
1582015/01/20 2000596  ET MALWARE Gator/Claria Data Submission; [1,2
1572015/01/20 2000595  ET DELETED Gator Checkin; [1,2
1562015/01/20 2000594  ET DELETED Mindset Interactive Ad Retrieval; [1,2
1552015/01/20 2000593  ET MALWARE Binet Ad Retrieval; [1,2
1542015/01/20 2000589  ET MALWARE TopMoxie Retrieving Data (downloads); [1,2
1532015/01/20 2000590  ET MALWARE TopMoxie Retrieving Data (common); [1,2
1522015/01/20 2000588  ET MALWARE TopMoxie Reporting Data to External Host; [1,2
1512015/01/20 2000587  ET MALWARE SpywareLabs VirtualBouncer Seeking Instructions; [1,2
1502015/01/20 2000586  ET MALWARE Ezula Related User-Agent (mez); [1,2,3
1492015/01/20 2000585  ET MALWARE F1Organizer Install Attempt; [1
1482015/01/20 2000584  ET MALWARE Mindset Interactive Install (2); [1,2
1472015/01/20 2000583  ET MALWARE Mindset Interactive Install (1); [1,2
1462015/01/20 2000582  ET MALWARE F1Organizer Reporting; [1
1452015/01/20 2000581  ET MALWARE Shop At Home Select.com Install Download; [1,2,3
1442015/01/20 2000580  ET MALWARE Shop At Home Select.com Install Attempt; [1,2,3
1432015/01/20 2000577  ET DELETED Popuptraffic.com Bot Reporting; [1,2
1422015/01/20 2000574  ET MALWARE Bargain Buddy; [1,2
1412015/01/20 2000575  ET SCAN ICMP PING IPTools; [1,2,3
1402015/01/20 2000572  ET POLICY AOL Webmail Login; [1
1392015/01/20 2000571  ET POLICY AOL Webmail Message Send; [1
1382015/01/20 2000570  ET DELETED KitCo Kcast Ticker (autray); [1
1372015/01/20 2000569  ET DELETED KitCo Kcast Ticker (agtray); [1
1362015/01/20 2000568  ET EXPLOIT Pwdump3e Password Hash Retrieval port 139; [1
1352015/01/20 2000567  ET EXPLOIT Pwdump3e pwservice.exe Access port 139; [1
1342015/01/20 2000566  ET EXPLOIT Pwdump3e Session Established Reg-Entry port 445; [1
1332015/01/20 2000565  ET EXPLOIT Pwdump3e Session Established Reg-Entry port 139; [1
1322015/01/20 2000563  ET EXPLOIT Pwdump3e Password Hash Retrieval port 445; [1
1312015/01/20 2000564  ET EXPLOIT Pwdump3e pwservice.exe Access port 445; [1
1302015/01/20 2000562  ET TROJAN OUTBOUND Suspicious Email Attachment; [1
1292015/01/20 2000560  ET POLICY HTTP CONNECT Tunnel Attempt Inbound; [1
1282015/01/20 2000559  ET WEB_SERVER THCIISLame IIS SSL Exploit Attempt; [1,2,3
1272015/01/20 2000546  ET SCAN NMAP -f -sX; [1
1262015/01/20 2000545  ET SCAN NMAP -f -sV; [1
1252015/01/20 2000544  ET SCAN NMAP -f -sN; [1
1242015/01/20 2000540  ET SCAN NMAP -sA (2); [1
1232015/01/20 2000543  ET SCAN NMAP -f -sF; [1
1222015/01/20 2000538  ET SCAN NMAP -sA (1); [1
1212015/01/20 2000537  ET SCAN NMAP -sS window 2048; [1
1202015/01/20 2000536  ET SCAN NMAP -sO; [1
1192015/01/20 2000520  ET MALWARE shell browser vulnerability NT/2K; [1,2
1182015/01/20 2000519  ET MALWARE shell browser vulnerability W9x/XP; [1,2
1172015/01/20 2000508  ET ATTACK_RESPONSE FTP inaccessible directory access NULL; [1
1162015/01/20 2000514  ET MALWARE IE homepage hijacking; [1,2
1152015/01/20 2000507  ET ATTACK_RESPONSE FTP inaccessible directory access AUX; [1
1142015/01/20 2000506  ET ATTACK_RESPONSE FTP inaccessible directory access LPT4; [1
1132015/01/20 2000505  ET ATTACK_RESPONSE FTP inaccessible directory access LPT3; [1
1122015/01/20 2000504  ET ATTACK_RESPONSE FTP inaccessible directory access LPT2; [1
< 531  532  533  534  535  536  537  538  539  540 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.