[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:27.410826 24.198.96.120:2224 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:58349 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xABA0C04 Ack: 0xC31F8CB Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:27.984874 24.198.96.120:2245 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:58405 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xACB12ED Ack: 0xCC70456 Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:28.281128 24.198.96.120:2255 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:58434 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xAD45EA9 Ack: 0xCAFA447 Win: 0x4470 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:31.531227 24.198.96.120:2381 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:58785 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xB402E91 Ack: 0xD0F750A Win: 0x4470 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:40.839596 24.198.96.120:2660 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:59578 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC33D46E Ack: 0xCF5FD7F Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/17-20:25:41.120329 24.198.96.120:2667 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:59604 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xC3A1B7B Ack: 0xDB5EAA2 Win: 0x4470 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/17-20:25:41.471792 24.198.96.120:2677 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:59673 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xC437A39 Ack: 0xCF542E5 Win: 0x4470 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:50.772654 24.198.96.120:2954 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:60348 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xD36C1F4 Ack: 0xDEB7B91 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:51.013776 24.198.96.120:2961 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:60366 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xD3BF340 Ack: 0xDB1D3ED Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:25:51.273170 24.198.96.120:2966 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:60392 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xD4029D2 Ack: 0xDC0923B Win: 0x4470 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:00.584307 24.198.96.120:3287 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61284 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE52B307 Ack: 0xEFEC8C7 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:03.811906 24.198.96.120:3378 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61588 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xEA0E943 Ack: 0xE52233E Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:04.072959 24.198.96.120:3387 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61605 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xEA7C456 Ack: 0xF378695 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:04.337627 24.198.96.120:3392 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61630 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEAC6278 Ack: 0xE8A3ED9 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:04.592665 24.198.96.120:3402 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61661 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xEB4D639 Ack: 0xE9A520D Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-20:26:04.874734 24.198.96.120:3416 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:61713 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEC0718E Ack: 0xEA045BA Win: 0x4470 TcpLen: 20 |