[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:13.094012 24.243.238.248:1618 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:6805 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xDE6C4D59 Ack: 0xF321F7A1 Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:16.602898 24.243.238.248:2038 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7226 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xDEE7E412 Ack: 0xF364F19F Win: 0xFAF0 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:16.818779 24.243.238.248:2040 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7253 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xDEEA6A99 Ack: 0xF3461F10 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:17.444261 24.243.238.248:2128 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7382 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xDF0FE3C4 Ack: 0xF38C1153 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:17.657487 24.243.238.248:2160 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7447 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xDF22042B Ack: 0xF3D78D4D Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/16-13:49:17.927632 24.243.238.248:2193 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7516 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xDF2E21AC Ack: 0xF3F38E22 Win: 0xFAF0 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/16-13:49:18.178912 24.243.238.248:2242 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:7651 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xDF4A1D48 Ack: 0xF3EB74C2 Win: 0xFAF0 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:21.655735 24.243.238.248:2629 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:8243 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xDFDDED1F Ack: 0xF3EBDCB3 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:24.895409 24.243.238.248:2962 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:8725 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE0788F19 Ack: 0xF3C03775 Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:25.144988 24.243.238.248:2984 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:8756 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE085EAD4 Ack: 0xF3AF4C7A Win: 0xFAF0 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:28.452263 24.243.238.248:3216 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:9399 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE11645B2 Ack: 0xF3C7A72B Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:31.704862 24.243.238.248:3517 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:10195 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xE1DF103A Ack: 0xF4EE6CBD Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:34.920789 24.243.238.248:3715 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:10621 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xE26E2483 Ack: 0xF507EA2C Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:35.130414 24.243.238.248:3724 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:10640 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xE2741CB6 Ack: 0xF51750FB Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:35.375654 24.243.238.248:3732 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:10666 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xE27B664E Ack: 0xF459474C Win: 0xFAF0 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/16-13:49:38.620685 24.243.238.248:3916 -> 192.168.1.6:80 TCP TTL:112 TOS:0x0 ID:11270 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xE30CC56B Ack: 0xF54029E6 Win: 0xFAF0 TcpLen: 20 |