[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/02-04:34:20.971764 24.136.163.137:3203 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:41624 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xA0514311 Ack: 0xFF5FE1C3 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/02-04:34:31.070206 24.136.163.137:4235 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:44424 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xA30EA5FE Ack: 0xFFAA1258 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/02-04:34:31.362727 24.136.163.137:4262 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:44509 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xA324E1D7 Ack: 0x27F644 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/02-04:34:31.595360 24.136.163.137:4278 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:44540 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xA3305FCB Ack: 0xFFD2A25E Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/02-04:34:34.826780 24.136.163.137:4288 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:45527 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xA33990B7 Ack: 0x8BE928 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/02-04:34:44.350241 24.136.163.137:4017 -> 192.168.1.6:80 TCP TTL:117 TOS:0x0 ID:48359 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xA6EA1FD5 Ack: 0x10E92A6 Win: 0xFAF0 TcpLen: 20 |