[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:09:47.159677 24.91.103.152:3919 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:27498 IpLen:20 DgmLen:112 DF ***AP*** Seq: 0xE97652B3 Ack: 0xEE71E54F Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1256:7] WEB-IIS CodeRed v2 root.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:09:51.521952 24.91.103.152:4208 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:28561 IpLen:20 DgmLen:110 DF ***AP*** Seq: 0xEA59564C Ack: 0xEF07830C Win: 0x4470 TcpLen: 20 [Xref => http://www.cert.org/advisories/CA-2001-19.html] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:09:52.092041 24.91.103.152:4252 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:28688 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xEA7B324D Ack: 0xEE80FDDF Win: 0x4470 TcpLen: 20 |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:09:52.803518 24.91.103.152:4283 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:28866 IpLen:20 DgmLen:120 DF ***AP*** Seq: 0xEA954235 Ack: 0xEEBA8851 Win: 0x4470 TcpLen: 20 |
[**] [1:1945:1] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:09:56.971282 24.91.103.152:4546 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:29782 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEB603FD9 Ack: 0xEEFEC3FC Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1288:5] WEB-FRONTPAGE /_vti_bin/ access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 04/23-23:10:00.730756 24.91.103.152:1060 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:30704 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xEC315452 Ack: 0xEEF41532 Win: 0x4470 TcpLen: 20 |
[**] [1:1286:5] WEB-IIS _mem_bin access [**] [Classification: access to a potentially vulnerable web application] [Priority: 2] 04/23-23:10:01.149570 24.91.103.152:1082 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:30792 IpLen:20 DgmLen:157 DF ***AP*** Seq: 0xEC421AF2 Ack: 0xEEEC3615 Win: 0x4470 TcpLen: 20 |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:01.783822 24.91.103.152:1110 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:30932 IpLen:20 DgmLen:185 DF ***AP*** Seq: 0xEC5966D3 Ack: 0xEFA41EAA Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:982:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:02.250242 24.91.103.152:1139 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:31030 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xEC702533 Ack: 0xEF26FDF0 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:06.402804 24.91.103.152:1363 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:31867 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xED1C96E4 Ack: 0xEFE4E58A Win: 0x4470 TcpLen: 20 |
[**] [1:981:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:07.000552 24.91.103.152:1408 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:31998 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xED409F6D Ack: 0xF0182C0C Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:983:6] WEB-IIS unicode directory traversal attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:07.524208 24.91.103.152:1434 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:32117 IpLen:20 DgmLen:137 DF ***AP*** Seq: 0xED568040 Ack: 0xEF7A75A4 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:10.998507 24.91.103.152:1697 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:32953 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xEE286853 Ack: 0xEFFD28B7 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:14.246625 24.91.103.152:1697 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:34242 IpLen:20 DgmLen:138 DF ***AP*** Seq: 0xEE286853 Ack: 0xEFFD28B7 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:14.590339 24.91.103.152:1910 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:34337 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEED26AF5 Ack: 0xEFE5F11C Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:17.900872 24.91.103.152:1910 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:34985 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEED26AF5 Ack: 0xEFE5F11C Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:970:5] WEB-IIS multiple decode attempt [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:18.429440 24.91.103.152:2115 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:35095 IpLen:20 DgmLen:140 DF ***AP*** Seq: 0xEF729643 Ack: 0xF07F56C2 Win: 0x4470 TcpLen: 20 [Xref => http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2001-0333] |
[**] [1:1002:5] WEB-IIS cmd.exe access [**] [Classification: Web Application Attack] [Priority: 1] 04/23-23:10:19.155748 24.91.103.152:2173 -> 192.168.1.6:80 TCP TTL:105 TOS:0x0 ID:35254 IpLen:20 DgmLen:136 DF ***AP*** Seq: 0xEF9FC7BB Ack: 0xF0820A32 Win: 0x4470 TcpLen: 20 |