[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:00.607793 24.59.74.47:3827 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:11489 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0x379A4F29 Ack: 0x2AACBC0A Win: 0xB5C9 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:01.043838 24.59.74.47:3834 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:11552 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0x37A0A6AE Ack: 0x2A9F17FC Win: 0xB5C9 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:10.553622 24.59.74.47:4131 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:13110 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x38A153CF Ack: 0x2B9779E6 Win: 0xB5C9 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:20.047217 24.59.74.47:4440 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14681 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0x39A861FD Ack: 0x2BDBE992 Win: 0xB5C9 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:20.224759 24.59.74.47:4447 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14713 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x39AEC661 Ack: 0x2C57D1E2 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/08-06:28:20.482894 24.59.74.47:4461 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14777 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x39BA3E72 Ack: 0x2C0E1961 Win: 0xB5C9 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 06/08-06:28:20.761612 24.59.74.47:4473 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14851 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0x39C4121B Ack: 0x2CBE258A Win: 0xB5C9 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:20.991511 24.59.74.47:4479 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14907 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0x39C94CD9 Ack: 0x2BCCE501 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:21.189511 24.59.74.47:4488 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:14959 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x39D0C71B Ack: 0x2C444BDD Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:30.838612 24.59.74.47:4840 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:16782 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x3AFB4F9C Ack: 0x2C870B97 Win: 0xB5C9 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:40.271095 24.59.74.47:1195 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:18535 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x3C0B6F5D Ack: 0x2DDC212E Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:40.462514 24.59.74.47:1209 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:18579 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0x3C1547C8 Ack: 0x2CF911BF Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:53.329416 24.59.74.47:1527 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:20912 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0x3D2211B7 Ack: 0x2E13D9F0 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:53.585739 24.59.74.47:1641 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:20989 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x3D8252A1 Ack: 0x2E0A3513 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:56.470279 24.59.74.47:1641 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:21472 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x3D8252A1 Ack: 0x2E0A3513 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:56.846394 24.59.74.47:1753 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:21545 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0x3DDFFBF6 Ack: 0x2EB1D9E4 Win: 0xB5C9 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 06/08-06:28:57.013228 24.59.74.47:1756 -> 192.168.1.6:80 TCP TTL:113 TOS:0x0 ID:21575 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0x3DE2FB20 Ack: 0x2E671FB4 Win: 0xB5C9 TcpLen: 20 |