[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:39:42.295746 24.242.253.122:1657 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:17575 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x8185335A Ack: 0x62BFC998 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:39:47.657795 24.242.253.122:3247 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:19956 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x85DB7331 Ack: 0x62B3339C Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:39:52.483458 24.242.253.122:3386 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:22022 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x8640FE50 Ack: 0x62EE156B Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:39:58.227384 24.242.253.122:1348 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:24397 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x8AA91DCE Ack: 0x636B95BA Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:40:03.592776 24.242.253.122:2229 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:26634 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x8D28F9D5 Ack: 0x635649CC Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/09-14:40:05.467306 24.242.253.122:2367 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:27563 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x8D8A54A1 Ack: 0x63DC0AA1 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/09-14:40:10.895945 24.242.253.122:3238 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:29848 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x90034C34 Ack: 0x6421C7A2 Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/09-14:40:19.174026 24.242.253.122:4306 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:33386 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x9291F0CB Ack: 0x64F75556 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/03-21:03:42.015496 24.242.253.122:1946 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:41720 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x18A80C72 Ack: 0xD84444C0 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/11-22:18:02.868803 24.242.253.122:1810 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:20542 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x2A0CAD34 Ack: 0xEFA49F0A Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:48:28.733548 24.242.253.122:2441 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:4444 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x7AC67B3 Ack: 0xEEF711D5 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:48:30.909367 24.242.253.122:1045 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:5474 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xD2779D0 Ack: 0xEF4FDE41 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:48:41.055069 24.242.253.122:2734 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:10275 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x11E15769 Ack: 0xEFA9AB03 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/14-15:48:42.683831 24.242.253.122:2885 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:11040 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x12498E92 Ack: 0xEFEB111A Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:09.790128 24.242.253.122:3970 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:23027 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x14D423CD Ack: 0xF02171B6 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:11.262403 24.242.253.122:4701 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:23534 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1F2284EB Ack: 0xF18AB783 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:12.942994 24.242.253.122:1103 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:24510 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1FBB5C37 Ack: 0xF1647072 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:15.376752 24.242.253.122:1438 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:25479 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x20A6FBDC Ack: 0xF236BC26 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:20.217479 24.242.253.122:1752 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:27503 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x218BD834 Ack: 0xF23365B7 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:22.133956 24.242.253.122:2514 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:28200 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x23A422E8 Ack: 0xF2091691 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:23.618084 24.242.253.122:2728 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:28915 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x243BA4CD Ack: 0xF1ED6EF0 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:25.353465 24.242.253.122:3028 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:29778 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x250D033F Ack: 0xF2D3790C Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/14-15:49:27.397071 24.242.253.122:3310 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:30503 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x25DEBDC5 Ack: 0xF2841EF9 Win: 0xFAF0 TcpLen: 20 |