[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:26.733635 24.160.23.53:3985 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:55642 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x14D26CF8 Ack: 0xA53879AF Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:27.722134 24.160.23.53:4000 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:55691 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x14DF95C9 Ack: 0xA56E013C Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:31.366562 24.160.23.53:4060 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:55925 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x1515C4C5 Ack: 0xA59848E5 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:31.939227 24.160.23.53:4072 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:55959 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x15210544 Ack: 0xA563DE5D Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:32.507818 24.160.23.53:4080 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56001 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1526DC39 Ack: 0xA4EACF1F Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/18-23:04:36.083489 24.160.23.53:4163 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56408 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x156F5BC3 Ack: 0xA5E61D18 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/18-23:04:36.621182 24.160.23.53:4185 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56549 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x15810AFC Ack: 0xA57D55CB Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:37.217808 24.160.23.53:4198 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56596 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x158D7D10 Ack: 0xA56B19AF Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:37.817818 24.160.23.53:4206 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56640 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1595C6AF Ack: 0xA5385D55 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:41.947346 24.160.23.53:4280 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56938 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x15DD46F2 Ack: 0xA5CDCCBF Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:42.527010 24.160.23.53:4290 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56974 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x15E6E67B Ack: 0xA6216D5D Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:43.084299 24.160.23.53:4295 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:56997 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x15EC7B37 Ack: 0xA6559B20 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:43.634049 24.160.23.53:4303 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:57027 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x15F4A655 Ack: 0xA5F50810 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:44.193131 24.160.23.53:4315 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:57077 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x15FE450D Ack: 0xA688227B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/18-23:04:44.755063 24.160.23.53:4324 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:57124 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1605EB2C Ack: 0xA5F037A4 Win: 0xFAF0 TcpLen: 20 |