alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; http_uri; fast_pattern:only; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; classtype:attempted-recon; sid:2009883; rev:6;)

Added 2011-10-12 19:28:28 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; http_uri; fast_pattern:only; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; sid:2009883; rev:6;)

Added 2011-09-14 22:41:46 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; http_uri; fast_pattern:only; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:6;)

Added 2011-02-04 17:29:17 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:4;)

Added 2010-05-20 10:46:05 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:4;)

Added 2010-05-20 10:46:05 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:4;)

Added 2010-05-20 10:43:59 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))"; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:4;)

Added 2010-05-20 10:43:59 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:49:14 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:49:14 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:47:17 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:47:17 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:46:00 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; uricontent:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:3;)

Added 2010-05-10 17:46:00 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:2;)

Added 2009-09-08 16:48:24 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:2;)

Added 2009-09-08 16:48:24 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:2;)

Added 2009-09-08 16:45:38 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; reference:url,doc.emergingthreats.net/2009883; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/SCAN/SCAN_Mysqloit; sid:2009883; rev:2;)

Added 2009-09-08 16:45:38 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; sid:2009883; rev:1;)

Added 2009-09-08 11:45:37 UTC


alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected"; flow:established,to_server; content:"+UNION+select+'BENCHMARK(10000000,SHA1(1))' HTTP/1.1"; offset:10; depth:144; classtype:attempted-recon; reference:url,code.google.com/p/mysqloit/; sid:2009883; rev:1;)

Added 2009-09-08 11:44:15 UTC


Topic revision: r1 - 2011-10-12 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats