[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:18.110375 24.30.227.136:4126 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:30849 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x15FA99B3 Ack: 0xB893BBFF Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:24.680213 24.30.227.136:4318 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:31721 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x16A203F2 Ack: 0xB920E51E Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:25.370646 24.30.227.136:4330 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:31804 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x16AD9E23 Ack: 0xB8B3483A Win: 0x4470 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:26.121091 24.30.227.136:4355 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:31910 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x16C45E6F Ack: 0xB8E0D66C Win: 0x4470 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:26.831234 24.30.227.136:4377 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:32008 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x16D8030B Ack: 0xB8A6862B Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/15-17:52:27.488360 24.30.227.136:4392 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:32093 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x16E4F0F9 Ack: 0xB9489C8E Win: 0x4470 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 05/15-17:52:31.674558 24.30.227.136:4517 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:32663 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x175216A3 Ack: 0xB9946608 Win: 0x4470 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:32.150053 24.30.227.136:4533 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:32750 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x17601078 Ack: 0xB9ABAD0F Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:42.494568 24.30.227.136:4848 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:34145 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x186AB585 Ack: 0xB9B62F2F Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:55.642345 24.30.227.136:3153 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:35952 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x196DAE82 Ack: 0xBA196E88 Win: 0x4470 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:52:56.388419 24.30.227.136:3261 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:36070 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x19CC115F Ack: 0xBAC9FC6F Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:00.435643 24.30.227.136:3380 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:36643 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x1A30D569 Ack: 0xBAC3CC40 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:01.182685 24.30.227.136:3407 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:36759 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x1A4674B8 Ack: 0xBB7667F9 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:01.926359 24.30.227.136:3434 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:36857 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1A5C1A5C Ack: 0xBB7AFFEA Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:04.847634 24.30.227.136:3434 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:37322 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1A5C1A5C Ack: 0xBB7AFFEA Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:05.634262 24.30.227.136:3566 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:37413 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x1ACDEF59 Ack: 0xBB376497 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 05/15-17:53:06.291726 24.30.227.136:3586 -> 192.168.1.6:80 TCP TTL:111 TOS:0x0 ID:37494 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x1ADDB51B Ack: 0xBBC1BB2B Win: 0x4470 TcpLen: 20 |