[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:43:28.700389 24.197.103.210:4393 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:3278 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xDBF20E24 Ack: 0x568B9603 Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:43:42.184810 24.197.103.210:4752 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:4467 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xDD251F87 Ack: 0x56D063E2 Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:43:48.972707 24.197.103.210:1057 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:5045 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xDDBCE02A Ack: 0x57A51A5E Win: 0x4470 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:00.626728 24.197.103.210:1358 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:6035 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xDECC8281 Ack: 0x579FFAC3 Win: 0x4470 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:04.428405 24.197.103.210:1407 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:6257 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xDEF8CEDD Ack: 0x5840256F Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/09-00:44:07.370332 24.197.103.210:1500 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:6559 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xDF4740A7 Ack: 0x585F2629 Win: 0x4470 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/09-00:44:11.197836 24.197.103.210:1573 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:6815 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xDF875B3F Ack: 0x5892D709 Win: 0x4470 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:14.083515 24.197.103.210:1656 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:7099 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xDFD22014 Ack: 0x58FAC7AB Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:17.974348 24.197.103.210:1725 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:7359 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE00F1254 Ack: 0x5950DC4D Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:20.864904 24.197.103.210:1821 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:7574 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE064306C Ack: 0x58B33A40 Win: 0x4470 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:36.356936 24.197.103.210:2096 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:8796 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE15890D1 Ack: 0x5A117F08 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:40.230005 24.197.103.210:2248 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:9075 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE1D48ABB Ack: 0x5A495813 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:43.093161 24.197.103.210:2337 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:9350 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xE2264060 Ack: 0x5A666968 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:46.969809 24.197.103.210:2414 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:9586 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xE268B871 Ack: 0x5A71AAB0 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:49.873320 24.197.103.210:2503 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:9810 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xE2B77E54 Ack: 0x5AFCB328 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/09-00:44:53.742269 24.197.103.210:2569 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:10096 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xE2F31EB3 Ack: 0x5B8F668A Win: 0x4470 TcpLen: 20 |