[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-20:33:36.388976 24.118.102.148:3004 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:5622 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x1CA90B9E Ack: 0xEB2B9BE2 Win: 0xFC00 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-20:33:45.568976 24.118.102.148:3561 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:7249 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x1E60E767 Ack: 0xEB82EA87 Win: 0xFC00 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-20:33:55.038139 24.118.102.148:3577 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:9081 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x1E6ED800 Ack: 0xEBEA45AA Win: 0xFC00 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-20:33:55.617967 24.118.102.148:4215 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:9146 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x205C046D Ack: 0xED72D053 Win: 0xFC00 TcpLen: 20 |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/16-20:34:03.630788 24.118.102.148:4919 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:10456 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x21CC37DA Ack: 0xEE222963 Win: 0xFC00 TcpLen: 20 |