[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:18.082353 24.160.16.46:3283 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:51508 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x17BA04BD Ack: 0x9CEA3D65 Win: 0xFDE8 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:20.303663 24.160.16.46:3459 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:52091 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x183BEC8D Ack: 0x9D6B51FB Win: 0xFDE8 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:22.304106 24.160.16.46:3584 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:52611 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x189B4991 Ack: 0x9CC06128 Win: 0xFDE8 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:24.215346 24.160.16.46:3732 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:53123 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x190A38C4 Ack: 0x9D1C3E7B Win: 0xFDE8 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:25.925554 24.160.16.46:3867 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:53595 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x196FFB37 Ack: 0x9CE715EF Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/28-22:29:27.931944 24.160.16.46:3992 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:54078 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x19C6B3E2 Ack: 0x9D0808C3 Win: 0xFDE8 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/28-22:29:30.014118 24.160.16.46:4128 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:54583 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x1A308CBF Ack: 0x9D4E266A Win: 0xFDE8 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:32.112087 24.160.16.46:4281 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:55128 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x1AA56686 Ack: 0x9D7358FB Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:43.009178 24.160.16.46:3507 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:58463 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1D5BA682 Ack: 0x9EA6CBD6 Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:44.812895 24.160.16.46:3612 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:58881 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1DAF92CB Ack: 0x9ED9199E Win: 0xFDE8 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:46.645121 24.160.16.46:3728 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:59318 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1E087EA6 Ack: 0x9E2B1D14 Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:47.018873 24.160.16.46:3853 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:59547 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1E68CB79 Ack: 0x9EB46F5E Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:47.317569 24.160.16.46:3910 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:59724 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x1E949615 Ack: 0x9F03309D Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:47.581283 24.160.16.46:3949 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:59842 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1EAD1542 Ack: 0x9F245D77 Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:51.313063 24.160.16.46:3949 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:60673 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1EAD1542 Ack: 0x9F245D77 Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:29:58.210982 24.160.16.46:4775 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:62304 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x208B9852 Ack: 0x9F98BFC5 Win: 0xFDE8 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/28-22:30:00.059216 24.160.16.46:4948 -> 192.168.1.6:80 TCP TTL:114 TOS:0x0 ID:62733 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x20EA69FB Ack: 0x9FBB4775 Win: 0xFDE8 TcpLen: 20 |