시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
1,2612015/01/20 2002923  ET EXPLOIT VNC Server Not Requiring Authentication (case 2); [1,2
1,2602015/01/20 2002922  ET POLICY VNC Authentication Successful; [1,2
1,2592015/01/20 2002921  ET EXPLOIT VNC Multiple Authentication Failures; [1,2
1,2582015/01/20 2002920  ET POLICY VNC Authentication Failure; [1,2
1,2572015/01/20 2002919  ET EXPLOIT VNC Good Authentication Reply; [1,2
1,2562015/01/20 2002918  ET EXPLOIT VNC Server VNC Auth Offer - No Challenge string; [1,2
1,2552015/01/20 2002917  ET EXPLOIT RealVNC Server Authentication Bypass Successful; [1,2,3
1,2542015/01/20 2002916  ET EXPLOIT RealVNC Authentication Bypass Attempt; [1,2,3
1,2532015/01/20 2002915  ET EXPLOIT VNC Authentication Reply; [1,2
1,2522015/01/20 2002914  ET EXPLOIT VNC Server VNC Auth Offer; [1,2
1,2512015/01/20 2002913  ET EXPLOIT VNC Client response; [1,2
1,2502015/01/20 2002912  ET EXPLOIT VNC Possible Vulnerable Server Response; [1,2
1,2492015/01/20 2002911  ET SCAN Potential VNC Scan 5900-5920; [1
1,2482015/01/20 2002910  ET SCAN Potential VNC Scan 5800-5820; [1
1,2472015/01/20 2002908  ET SHELLCODE x86 JmpCallAdditive Encoder; [1
1,2462015/01/20 2002907  ET SHELLCODE x86 PexCall Encoder; [1
1,2452015/01/20 2002906  ET SHELLCODE x86 PexAlphaNum Encoder; [1
1,2442015/01/20 2002905  ET SHELLCODE x86 Countdown Encoder; [1
1,2432015/01/20 2002904  ET SHELLCODE x86 Alpha2 GetEIPs Encoder; [1
1,2422015/01/20 2002903  ET SHELLCODE x86 PexFnstenvMov/Sub Encoder; [1
1,2412015/01/20 2002902  ET WEB_SPECIFIC_APPS PHP VWar Remote File Inclusion functions_install.php; [1
1,2402015/01/20 2002901  ET WEB_SPECIFIC_APPS PHP Aardvark Topsites PHP CONFIG PATH Remote File Include Attempt; [1,2
1,2392015/01/20 2002900  ET WEB_SERVER CGI AWstats Migrate Command Attempt; [1
1,2382015/01/20 2002899  ET WEB_SPECIFIC_APPS PHP VWar Remote File Inclusion get_header.php; [1,2
1,2372015/01/20 2002898  ET WEB_SPECIFIC_APPS PHP Web Calendar Remote File Inclusion Attempt; [1
1,2362015/01/20 2002897  ET WEB_SPECIFIC_APPS Horde README access probe; [1,2
1,2352015/01/20 2002896  ET EXPLOIT Symantec Scan Engine Request Password Hash; [1
1,2342015/01/20 2002895  ET DELETED W32.Nugache SMTP Outbound; [1,2
1,2332015/01/20 2002894  ET DELETED W32.Nugache SMTP Inbound; [1,2
1,2322015/01/20 2002893  ET DELETED Mytob.X clam SMTP Outbound; [1,2
1,2312015/01/20 2002892  ET DELETED Mytob.X clam SMTP Inbound; [1,2
1,2302015/01/20 2002889  ET ACTIVEX JuniperSetup Control Buffer Overflow; [1,2
1,2292015/01/20 2002888  ET EXPLOIT SYS get_v2_domain_index_tables Privilege Escalation Attempt; [1
1,2282015/01/20 2002887  ET EXPLOIT SYS get_domain_index_tables Access; [1
1,2272015/01/20 2002886  ET EXPLOIT SYS get_domain_index_metadata Privilege Escalation Attempt; [1
1,2262015/01/20 2002882  ET SNMP Cisco Non-Trap PDU request on SNMPv3 trap port; [1
1,2252015/01/20 2002881  ET SNMP Cisco Non-Trap PDU request on SNMPv2 trap port; [1
1,2242015/01/20 2002880  ET SNMP Cisco Non-Trap PDU request on SNMPv1 trap port; [1
1,2232015/01/20 2002879  ET WEB_SPECIFIC_APPS PHP phpMyAgenda rootagenda Remote File Include Attempt; [1
1,2222015/01/20 2002878  ET POLICY iTunes User Agent; [1,2
1,2212015/01/20 2002877  ET TROJAN TROJAN BankSnif/Nethelper User-Agent (nethelper); [1
1,2202015/01/20 2002874  ET TROJAN Metafisher/Goldun User-Agent (z); [1
1,2192015/01/20 2002872  ET POLICY Myspace Login Attempt; [1
1,2182015/01/20 2002871  ET DELETED WebAttacker kit (bug ie0604); [1
1,2172015/01/20 2002870  ET DELETED WebAttacker kit (exploit ie0604); [1
1,2162015/01/20 2002869  ET DELETED WebAttacker kit (exploit1 ie0601); [1
1,2152015/01/20 2002868  ET WEB_SPECIFIC_APPS Horde Web Mail Help Access; [1
1,2142015/01/20 2002867  ET WEB_SPECIFIC_APPS Horde 3.0.9-3.1.0 Help Viewer Remote PHP Exploit; [1
1,2132015/01/20 2002866  ET POLICY Winpcap Installation in Progress; [1,2
1,2122015/01/20 2002865  ET WEB_SERVER Novell GroupWise Messenger Accept Language Buffer Overflow; [1
< 511  512  513  514  515  516  517  518  519  520 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.