[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:19.674540 24.148.68.177:1038 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:9465 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x88C3BBFB Ack: 0x3DBE9990 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:24.002105 24.148.68.177:1131 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:9723 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x891EACA8 Ack: 0x3F415E88 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:24.520621 24.148.68.177:1145 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:9763 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x892CD060 Ack: 0x3FA90A8D Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:25.092895 24.148.68.177:1160 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:9830 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x8939B32A Ack: 0x3F5EC0DC Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:25.752998 24.148.68.177:1220 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:9966 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x896938E8 Ack: 0x3FCBF037 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-15:55:26.457200 24.148.68.177:1283 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10010 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x899922E8 Ack: 0x3F37676A Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-15:55:31.415654 24.148.68.177:1353 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10348 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x89DC0A01 Ack: 0x40294B9E Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:33.095746 24.148.68.177:1376 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10417 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x89F350A6 Ack: 0x404967EC Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:34.780823 24.148.68.177:1410 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10524 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x8A1211FD Ack: 0x4067B91A Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:36.419131 24.148.68.177:1430 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10669 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x8A27035F Ack: 0x401A0773 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:37.822272 24.148.68.177:1449 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10730 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x8A3CC8AB Ack: 0x3FB01A7D Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:39.168655 24.148.68.177:1480 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10813 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x8A578C33 Ack: 0x408A09BE Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:40.554925 24.148.68.177:1495 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:10895 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x8A672B71 Ack: 0x4073A0B1 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:43.651175 24.148.68.177:1495 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:11060 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x8A672B71 Ack: 0x4073A0B1 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:45.106292 24.148.68.177:1579 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:11124 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x8AB0CEAD Ack: 0x4059D168 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:46.910116 24.148.68.177:1600 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:11255 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x8AC532EF Ack: 0x4036767B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-15:55:50.902880 24.148.68.177:1778 -> 192.168.1.6:80 TCP TTL:115 TOS:0x0 ID:11642 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x8B5BEA1C Ack: 0x40DAC6FE Win: 0xFAF0 TcpLen: 20 |