시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1,4612015/01/20 2003182  ET DELETED Prg Trojan v0.1-v0.3 Data Upload; [1,2
1,4602015/01/20 2003180  ET TROJAN Possible Warezov/Stration Data Post to Controller; [1,2
1,4592015/01/20 2003179  ET POLICY exe download without User Agent; [1
1,4582015/01/20 2003176  ET DELETED Warezov/Stration Challenge Response; [1,2
1,4572015/01/20 2003175  ET DELETED Warezov/Stration Challenge; [1,2
1,4562015/01/20 2003174  ET SHELLCODE Possible UTF-16 encoded Shellcode Detected; [1
1,4552015/01/20 2003173  ET SHELLCODE Possible UTF-8 encoded Shellcode Detected; [1
1,4542015/01/20 2003171  ET SCAN IBM NSA User Agent; [1,2
1,4532015/01/20 2003170  ET DELETED Zango Spyware Activity; [1,2
1,4522015/01/20 2003168  ET POLICY Winamp Streaming User Agent; [1
1,4512015/01/20 2003167  ET WEB_SPECIFIC_APPS tikiwiki featured link XSS attempt; [1,2
1,4502015/01/20 2003166  ET ACTIVEX Microsoft Outlook.Application object call CSLID; [1
1,4492015/01/20 2003165  ET ACTIVEX Microsoft Outlook Data Object object call CSLID; [1
1,4482015/01/20 2003164  ET ACTIVEX Microsoft Business Object Factory object call CSLID; [1
1,4472015/01/20 2003163  ET ACTIVEX Microsoft VsaIDE.DTE object call CSLID; [1
1,4462015/01/20 2003162  ET ACTIVEX Microsoft Microsoft.DbgClr.DTE.8.0 object call CSLID; [1
1,4452015/01/20 2003161  ET ACTIVEX Microsoft VisualStudio.DTE.8.0 object call CSLID; [1
1,4442015/01/20 2003160  ET ACTIVEX Microsoft DExplore.AppObj.8.0 object call CSLID; [1
1,4432015/01/20 2003159  ET ACTIVEX Microsoft VsmIDE.DTE object call CSLID; [1
1,4422015/01/20 2003158  ET ACTIVEX Microsoft WMIScriptUtils.WMIObjectBroker object call CSLID; [1,2,3,4
1,4412015/01/20 2003157  ET TROJAN Agobot-SDBot Commands; [1
1,4402015/01/20 2003156  ET DELETED Crewbox Proxy Scan; [1
1,4392015/01/20 2003155  ET POLICY Microsoft TEREDO IPv6 tunneling; [1
1,4382015/01/20 2003154  ET MALWARE Bestcount.net Spyware Data Upload; [1,2
1,4372015/01/20 2003153  ET MALWARE Bestcount.net Spyware Exploit Download; [1,2
1,4362015/01/20 2003152  ET WEB_SPECIFIC_APPS CutePHP CuteNews directory traversal vulnerability - show_archives; [1
1,4352015/01/20 2003151  ET MALWARE Fun Web Products SmileyCentral IEsp2 Install; [1,2
1,4342015/01/20 2003150  ET ATTACK_RESPONSE Possible /etc/passwd via SMTP (BSD style); [1
1,4332015/01/20 2003149  ET ATTACK_RESPONSE Possible /etc/passwd via SMTP (linux style); [1
1,4322015/01/20 2003148  ET EXPLOIT Novell HttpStk Remote Code Execution Attempt /nds (linewrap); [1
1,4312015/01/20 2003147  ET EXPLOIT Novell HttpStk Remote Code Execution Attempt /dhost (linewrap); [1
1,4302015/01/20 2003146  ET EXPLOIT Novell HttpStk Remote Code Execution Attempt /dhost; [1
1,4292015/01/20 2003145  ET EXPLOIT Novell HttpStk Remote Code Execution Attempt /nds; [1
1,4282015/01/20 2003144  ET DELETED SpamThru trojan AV scan report; [1,2
1,4272015/01/20 2003143  ET DELETED SpamThru trojan spam run report; [1,2
1,4262015/01/20 2003142  ET DELETED SpamThru trojan spam template request; [1,2
1,4252015/01/20 2003141  ET DELETED SpamThru trojan AV DLL request; [1,2
1,4242015/01/20 2003140  ET DELETED SpamThru trojan update request; [1,2
1,4232015/01/20 2003139  ET DELETED SpamThru trojan SMTP test successful; [1,2
1,4222015/01/20 2003138  ET DELETED SpamThru trojan peer exchange; [1,2
1,4212015/01/20 2003132  ET TROJAN BOT - potential DDoS command (2); [1
1,4202015/01/20 2003122  ET DELETED Possible docs.google.com Activity; [1,2
1,4192015/01/20 2003121  ET POLICY docs.google.com Activity; [1,2
1,4182015/01/20 2003120  ET DELETED Possible Image Spam Inbound (3); [1
1,4172015/01/20 2003119  ET DELETED SHELLCODE ADMutate polymorphic payload; [1,2
1,4162015/01/20 2003118  ET DELETED SHELLCODE Shikata Ga Nai polymorphic payload; [1,2
1,4152015/01/20 2003117  ET DELETED SHELLCODE CLET polymorphic payload; [1,2
1,4142015/01/20 2003116  ET TROJAN - Trojan.Proxy.PPAgent.t (updateb); [1,2
1,4132015/01/20 2003115  ET TROJAN - Trojan.Proxy.PPAgent.t (updatea); [1,2
1,4122015/01/20 2003110  ET WEB_CLIENT MSIE WebViewFolderIcon setSlice invalid memory copy; [1,2,3
< 511  512  513  514  515  516  517  518  519  520 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.