[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:41:56.724896 24.218.253.67:4385 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:7246 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xBC59986F Ack: 0x22BAEB66 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:00.353167 24.218.253.67:4641 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:7803 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xBD0EEDEC Ack: 0x231BFEC8 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:07.595324 24.218.253.67:1085 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:8953 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xBDC19CF0 Ack: 0x22AE82C5 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:08.409905 24.218.253.67:1311 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:9089 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xBE738E7B Ack: 0x233EBE2F Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:12.881211 24.218.253.67:1567 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:9840 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xBF42F7E1 Ack: 0x23CE8076 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-23:42:13.867033 24.218.253.67:1612 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:10011 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xBF67521C Ack: 0x23B18E35 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/12-23:42:14.845230 24.218.253.67:1672 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:10168 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xBF9717BC Ack: 0x23F3725A Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:19.044654 24.218.253.67:1923 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:10855 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xC05B650F Ack: 0x24268045 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:19.829650 24.218.253.67:1967 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:10983 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC07D7FE9 Ack: 0x2354E5F3 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:23.714604 24.218.253.67:2209 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:11622 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC13F3F65 Ack: 0x23ECE7C7 Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:24.158132 24.218.253.67:2229 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:11693 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC14E42DC Ack: 0x245E7C83 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:24.686258 24.218.253.67:2261 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:11778 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xC163A803 Ack: 0x243EE3AE Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:28.380495 24.218.253.67:2488 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:12339 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xC218A5D8 Ack: 0x24108B5E Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:28.598252 24.218.253.67:2501 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:12361 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC22276EB Ack: 0x23F2F93C Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:31.711945 24.218.253.67:2501 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:12853 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC22276EB Ack: 0x23F2F93C Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:32.020953 24.218.253.67:2702 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:12904 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xC2C63512 Ack: 0x240B33DA Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/12-23:42:32.483173 24.218.253.67:2729 -> 192.168.1.6:80 TCP TTL:110 TOS:0x0 ID:12985 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xC2DBA7FC Ack: 0x24794FB0 Win: 0xFAF0 TcpLen: 20 |