[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:03:52.662701 24.202.34.72:4306 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:55745 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xBFB08367 Ack: 0x9E2D2779 Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:03:59.130684 24.202.34.72:4409 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:56263 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xC0108968 Ack: 0x9ECEC0A9 Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:01.101134 24.202.34.72:4432 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:56418 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xC027D399 Ack: 0x9EEAD255 Win: 0x4470 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:03.038482 24.202.34.72:4470 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:56527 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xC0473659 Ack: 0x9EE996A3 Win: 0x4470 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:08.249171 24.202.34.72:4486 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:56854 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC05A12D5 Ack: 0x9F315C46 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/17-21:04:10.508844 24.202.34.72:4555 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:57005 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xC09B659E Ack: 0x9F64B9F2 Win: 0x4470 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/17-21:04:13.007993 24.202.34.72:4592 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:57161 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xC0BDA837 Ack: 0x9F1DE732 Win: 0x4470 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:18.488402 24.202.34.72:4620 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:57480 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xC0DC13F8 Ack: 0x9F355E37 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:20.468709 24.202.34.72:4687 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:57638 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC11EB576 Ack: 0x9FDC8407 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:31.918536 24.202.34.72:4843 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:58333 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC1AF7976 Ack: 0xA037768C Win: 0x4470 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:36.864713 24.202.34.72:4872 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:58675 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC1CC47E6 Ack: 0x9FFB95F7 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:38.882274 24.202.34.72:4980 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:58816 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC210E053 Ack: 0xA11F8387 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:48.021468 24.202.34.72:1090 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:59350 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xC253B91E Ack: 0xA0AB6CD1 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:49.973170 24.202.34.72:1164 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:59518 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC29CC707 Ack: 0xA16844B9 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:04:52.054952 24.202.34.72:1197 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:59662 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xC2BA1100 Ack: 0xA155E841 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/17-21:05:03.220383 24.202.34.72:1376 -> 192.168.1.6:80 TCP TTL:108 TOS:0x0 ID:60546 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC35C9E85 Ack: 0xA27F1EA3 Win: 0x4470 TcpLen: 20 |