시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
17,8612015/01/20 2101913  GPL RPC STATD UDP stat mon_name format string exploit attempt;  
17,8602015/01/20 2101912  GPL RPC sadmind TCP NETMGT_PROC_SERVICE CLIENT_DOMAIN overflow attempt;  
17,8592015/01/20 2101909  GPL RPC CMSD TCP CMSD_INSERT buffer overflow attempt; [1
17,8582015/01/20 2101908  GPL RPC CMSD TCP CMSD_CREATE buffer overflow attempt;  
17,8572015/01/20 2101907  GPL RPC CMSD UDP CMSD_CREATE buffer overflow attempt;  
17,8562015/01/20 2101904  GPL IMAP find overflow attempt;  
17,8552015/01/20 2101903  GPL IMAP rename overflow attempt;  
17,8542015/01/20 2101902  GPL IMAP lsub literal overflow attempt;  
17,8532015/01/20 2101901  GPL EXPLOIT successful kadmind buffer overflow attempt; [1
17,8522015/01/20 2101900  GPL EXPLOIT successful kadmind buffer overflow attempt; [1
17,8512015/01/20 2101899  GPL EXPLOIT kadmind buffer overflow attempt 3; [1
17,8502015/01/20 2101898  GPL EXPLOIT kadmind buffer overflow attempt 2; [1
17,8492015/01/20 2101897  GPL EXPLOIT kadmind buffer overflow attempt; [1
17,8482015/01/20 2101896  GPL EXPLOIT kadmind buffer overflow attempt; [1
17,8472015/01/20 2101895  GPL EXPLOIT kadmind buffer overflow attempt; [1
17,8462015/01/20 2101894  GPL EXPLOIT kadmind buffer overflow attempt; [1
17,8452015/01/20 2101893  GPL SNMP missing community string attempt;  
17,8442015/01/20 2101892  GPL SNMP null community string attempt;  
17,8432015/01/20 2101891  GPL RPC status GHBN format string attack;  
17,8422015/01/20 2101888  GPL FTP SITE CPWD overflow attempt;  
17,8412015/01/20 2101886  GPL ATTACK_RESPONSE id check returned apache;  
17,8402015/01/20 2101885  GPL ATTACK_RESPONSE id check returned http;  
17,8392015/01/20 2101884  GPL ATTACK_RESPONSE id check returned web;  
17,8382015/01/20 2101883  GPL ATTACK_RESPONSE id check returned nobody;  
17,8372015/01/20 2101882  GPL ATTACK_RESPONSE id check returned userid;  
17,8362015/01/20 2101877  GPL WEB_SERVER printenv access;  
17,8352015/01/20 2101874  GPL WEB_SERVER Oracle Java Process Manager access;  
17,8342015/01/20 2101867  GPL RPC xdmcp info query;  
17,8332015/01/20 2101866  GPL POP3 USER overflow attempt;  
17,8322015/01/20 2101864  GPL FTP SITE NEWER attempt;  
17,8312015/01/20 2101861  GPL POLICY Linksys router default username and password login attempt;  
17,8302015/01/20 2101860  GPL POLICY Linksys router default password login attempt;  
17,8292015/01/20 2101859  GPL POLICY Sun JavaServer default password login attempt;  
17,8282015/01/20 2101857  GPL WEB_SERVER robot.txt access;  
17,8272015/01/20 2101852  GPL WEB_SERVER robots.txt access;  
17,8262015/01/20 2101847  GPL WEB_SERVER webalizer access;  
17,8252015/01/20 2101846  GPL POLICY vncviewer Java applet download attempt;  
17,8242015/01/20 2101845  GPL IMAP list literal overflow attempt;  
17,8232015/01/20 2101844  GPL IMAP authenticate overflow attempt;  
17,8222015/01/20 2101842  GPL IMAP login buffer overflow attempt;  
17,8212015/01/20 2101840  GPL WEB_CLIENT Javascript document.domain attempt;  
17,8202015/01/20 2101838  GPL EXPLOIT SSH server banner overflow;  
17,8192015/01/20 2101837  GPL INAPPROPRIATE alt.binaries.pictures.tinygirls;  
17,8182015/01/20 2101833  GPL INAPPROPRIATE naked lesbians;  
17,8172015/01/20 2101821  GPL EXPLOIT LPD dvips remote command execution attempt;  
17,8162015/01/20 2101818  GPL WEB_SERVER MS Site Server admin attempt;  
17,8152015/01/20 2101817  GPL WEB_SERVER MS Site Server default login attempt;  
17,8142015/01/20 2101809  GPL WEB_SERVER Apache Chunked-Encoding worm attempt;  
17,8132015/01/20 2101808  GPL EXPLOIT apache chunked encoding memory corruption exploit attempt;  
17,8122015/01/20 2101792  GPL MISC return code buffer overflow attempt;  
< 181  182  183  184  185  186  187  188  189  190 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.