IDS: ET SCAN Potential SSH Scan OUTBOUND
snortsignatures
Разбор сигнатуры IDS: ET SCAN Potential SSH Scan OUTBOUND
SEC-1275-1
IDS: MALWARE-CNC Win.Trojan.Glupteba C&C server HELLO request to client
snortsignatures
Разбор сигнатуры IDS: MALWARE-CNC Win.Trojan.Glupteba C&C server HELLO request to client
SEC-1275-1
IDS: SQL use of sleep function in HTTP header - likely SQL injection attempt
snortsignatures
Разбор сигнатуры IDS: SQL use of sleep function in HTTP header - likely SQL injection attempt
SEC-1275-1
IDS: ET SCAN Behavioral Unusually fast Terminal Server Traffic Potential Scan or Infection (Inbound)
snortsignatures
Разбор сигнатуры IDS: ET SCAN Behavioral Unusually fast Terminal Server Traffic Potential Scan or Infection (Inbound)
SEC-1275-1
IDS: ET TROJAN Possible WannaCry? DNS Lookup 1
snortsignatures
Разбор сигнатуры IDS: ET TROJAN Possible WannaCry? DNS Lookup 1
SEC-1275-1
IDS: ET TROJAN Possible WannaCry? DNS Lookup 2
snortsignatures
Разбор сигнатуры IDS: ET TROJAN Possible WannaCry? DNS Lookup 2
SEC-1275-1
IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray
snortsignatures
Разбор сигнатуры IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray
SEC-1275-1
IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set)
snortsignatures
Разбор сигнатуры IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Request (set)
SEC-1275-1
IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response
snortsignatures
Разбор сигнатуры IDS: ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response
SEC-1275-1
IDS: ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
snortsignatures
Разбор сигнатуры IDS: ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1
SEC-1275-1