[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:00.581667 24.99.49.210:3251 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:8240 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x7A137434 Ack: 0xDACF0E05 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:01.436227 24.99.49.210:3297 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:8331 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x7A391AB5 Ack: 0xDAAB6824 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:01.824412 24.99.49.210:3303 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:8363 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x7A3F32C5 Ack: 0xDAAF6D79 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:11.834661 24.99.49.210:3563 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9120 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x7B22EA72 Ack: 0xDAE4C386 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:12.092766 24.99.49.210:3576 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9152 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x7B2EB695 Ack: 0xDB56CA63 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/29-01:01:12.375934 24.99.49.210:3587 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9183 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x7B373B56 Ack: 0xDAE35950 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/29-01:01:12.627927 24.99.49.210:3596 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:9208 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x7B3F08AE Ack: 0xDB4DB6E0 Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:22.229288 24.99.49.210:3872 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10045 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x7C30BF0F Ack: 0xDBD42FC3 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:22.401935 24.99.49.210:3881 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10068 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x7C38BA41 Ack: 0xDC34721F Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:22.730637 24.99.49.210:3888 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10088 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x7C3EBC43 Ack: 0xDC153484 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:22.995005 24.99.49.210:3897 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10116 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x7C47B977 Ack: 0xDBDE7430 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:23.333086 24.99.49.210:3906 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10148 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x7C4FEB62 Ack: 0xDBABD5AB Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:23.564302 24.99.49.210:3924 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10174 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x7C5DFBDF Ack: 0xDBDA01C1 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:26.953300 24.99.49.210:3931 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10482 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x7C646A52 Ack: 0xDC0C7901 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:27.160433 24.99.49.210:4034 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10510 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x7CC04AA5 Ack: 0xDC2B9E7E Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/29-01:01:27.458063 24.99.49.210:4042 -> 192.168.1.6:80 TCP TTL:109 TOS:0x0 ID:10539 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x7CC63EF6 Ack: 0xDC007D32 Win: 0xFAF0 TcpLen: 20 |