[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:34:37.652641 24.125.85.187:2621 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:5445 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x9DCCC8C4 Ack: 0xA0ECF42D Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:34:42.775238 24.125.85.187:2767 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:5950 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x9E4A473E Ack: 0xA13C6D95 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:34:43.395275 24.125.85.187:2787 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:6014 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x9E5B2B94 Ack: 0xA1A45546 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:05.058868 24.125.85.187:3400 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:8125 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xA05E971B Ack: 0xA2D4DF65 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:05.390737 24.125.85.187:3421 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:8173 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xA06E47D2 Ack: 0xA26E957B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-09:35:15.028713 24.125.85.187:3677 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9029 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xA144DCD6 Ack: 0xA2F0BFA2 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-09:35:18.722122 24.125.85.187:3693 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9320 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xA151C3DC Ack: 0xA3DEEB45 Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:19.340376 24.125.85.187:3790 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9385 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xA1A38505 Ack: 0xA3CD9586 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:19.851771 24.125.85.187:3804 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9425 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xA1B0566D Ack: 0xA3A16E40 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:23.555119 24.125.85.187:3817 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9772 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xA1BBB405 Ack: 0xA36A3114 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:23.734831 24.125.85.187:3921 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9799 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xA212D181 Ack: 0xA38D8C3B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:33.375467 24.125.85.187:4194 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10811 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xA2F66A7F Ack: 0xA47D3D70 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:33.887420 24.125.85.187:4213 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10875 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xA30623C4 Ack: 0xA4726D99 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:37.377859 24.125.85.187:4226 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:11242 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xA3116F12 Ack: 0xA4FA5053 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:43.470011 24.125.85.187:4226 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:11874 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xA3116F12 Ack: 0xA4FA5053 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:47.098609 24.125.85.187:4603 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:12209 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xA446C1E4 Ack: 0xA549A092 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-09:35:47.684296 24.125.85.187:4629 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:12295 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xA45B1804 Ack: 0xA5731EC6 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:37.461402 24.125.85.187:2698 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36501 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x74EF04F7 Ack: 0xCCF4C7BB Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:38.172969 24.125.85.187:2773 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36667 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x75286EA1 Ack: 0xCD4AB703 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:38.765632 24.125.85.187:2792 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36752 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x75373936 Ack: 0xCD8B132E Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:39.078135 24.125.85.187:2819 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36830 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x754EC2AE Ack: 0xCD141342 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:39.438122 24.125.85.187:2837 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36885 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x755DC6F3 Ack: 0xCCE1ED6B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/15-20:13:39.855507 24.125.85.187:2857 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:36938 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x756D5E12 Ack: 0xCD6B9F41 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/15-20:13:40.306316 24.125.85.187:2868 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:37058 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x75764CA9 Ack: 0xCD2638E4 Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:49.742967 24.125.85.187:3344 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:38405 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x76EEC2E8 Ack: 0xCD8B06A5 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:50.046873 24.125.85.187:3364 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:38440 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x76FE9EAC Ack: 0xCD6F34F5 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:53.389878 24.125.85.187:3546 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:39013 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x77920E61 Ack: 0xCDA59044 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:53.700628 24.125.85.187:3562 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:39051 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x779F1C15 Ack: 0xCDBED300 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:54.288278 24.125.85.187:3576 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:39121 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x77AB16F2 Ack: 0xCE24C6B0 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:13:55.004543 24.125.85.187:3607 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:39210 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x77C30B84 Ack: 0xCE4A36B1 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:14:05.557065 24.125.85.187:4205 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:41120 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x79988F92 Ack: 0xCE70A905 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-20:14:05.774675 24.125.85.187:4209 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:41163 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x799BCBEC Ack: 0xCF13F53E Win: 0xFAF0 TcpLen: 20 |