📄 sid-msg.map
字号:
519 || TFTP parent directory || arachnids,137 || cve,1999-0183 || cve,2002-1209520 || TFTP root directory || arachnids,138 || cve,1999-0183521 || MISC Large UDP Packet || arachnids,247522 || MISC Tiny Fragments523 || BAD-TRAFFIC ip reserved bit set524 || BAD-TRAFFIC tcp port 0 traffic525 || BAD-TRAFFIC udp port 0 traffic || bugtraq,576 || cve,1999-0675 || nessus,10074526 || BAD-TRAFFIC data in TCP SYN packet || url,www.cert.org/incident_notes/IN-99-07.html527 || BAD-TRAFFIC same SRC/DST || bugtraq,2666 || cve,1999-0016 || url,www.cert.org/advisories/CA-1997-28.html528 || BAD-TRAFFIC loopback traffic || url,rr.sans.org/firewall/egress.php529 || NETBIOS DOS RFPoison || arachnids,454530 || NETBIOS NT NULL session || arachnids,204 || bugtraq,1163 || cve,2000-0347532 || NETBIOS SMB ADMIN$ share access533 || NETBIOS SMB C$ share access534 || NETBIOS SMB CD.. || arachnids,338535 || NETBIOS SMB CD... || arachnids,337536 || NETBIOS SMB D$ share access537 || NETBIOS SMB IPC$ share access538 || NETBIOS SMB IPC$ unicode share access539 || NETBIOS Samba clientaccess || arachnids,341540 || CHAT MSN message541 || CHAT ICQ access542 || CHAT IRC nick change543 || POLICY FTP 'STOR 1MB' possible warez site544 || POLICY FTP 'RETR 1MB' possible warez site545 || POLICY FTP 'CWD / ' possible warez site546 || POLICY FTP 'CWD ' possible warez site547 || POLICY FTP 'MKD ' possible warez site548 || POLICY FTP 'MKD .' possible warez site549 || P2P napster login550 || P2P napster new user login551 || P2P napster download attempt552 || P2P napster upload request553 || POLICY FTP anonymous login attempt554 || POLICY FTP 'MKD / ' possible warez site555 || POLICY WinGate telnet server response || arachnids,366 || cve,1999-0657556 || P2P Outbound GNUTella client request557 || P2P GNUTella client request558 || INFO Outbound GNUTella client request559 || P2P Inbound GNUTella client request560 || POLICY VNC server response561 || P2P Napster Client Data562 || P2P Napster Client Data563 || P2P Napster Client Data564 || P2P Napster Client Data565 || P2P Napster Server Login566 || POLICY PCAnywhere server response || arachnids,239567 || POLICY SMTP relaying denied || arachnids,249 || url,mail-abuse.org/tsi/ar-fix.html568 || POLICY HP JetDirect LCD modification attempt || arachnids,302 || bugtraq,2245569 || RPC snmpXdmi overflow attempt TCP || bugtraq,2417 || cve,2001-0236 || url,www.cert.org/advisories/CA-2001-05.html570 || RPC EXPLOIT ttdbserv solaris overflow || arachnids,242 || bugtraq,122 || cve,1999-0003 || url,www.cert.org/advisories/CA-2001-27.html571 || RPC EXPLOIT ttdbserv Solaris overflow || arachnids,242 || bugtraq,122 || cve,1999-0003 || url,www.cert.org/advisories/CA-2001-27.html572 || RPC DOS ttdbserv Solaris || arachnids,241 || bugtraq,122 || cve,1999-0003573 || RPC AMD Overflow || arachnids,217 || cve,1999-0704574 || RPC mountd TCP export request || arachnids,26575 || RPC portmap admind request UDP || arachnids,18576 || RPC portmap amountd request UDP || arachnids,19577 || RPC portmap bootparam request UDP || arachnids,16 || cve,1999-0647578 || RPC portmap cmsd request UDP || arachnids,17579 || RPC portmap mountd request UDP || arachnids,13580 || RPC portmap nisd request UDP || arachnids,21581 || RPC portmap pcnfsd request UDP || arachnids,22582 || RPC portmap rexd request UDP || arachnids,23583 || RPC portmap rstatd request UDP || arachnids,10584 || RPC portmap rusers request UDP || arachnids,133 || cve,1999-0626585 || RPC portmap sadmind request UDP || arachnids,20586 || RPC portmap selection_svc request UDP || arachnids,25587 || RPC portmap status request UDP || arachnids,15588 || RPC portmap ttdbserv request UDP || arachnids,24 || bugtraq,122 || bugtraq,3382 || cve,1999-0003 || cve,1999-0687 || cve,1999-1075 || cve,2001-0717 || url,www.cert.org/advisories/CA-2001-05.html589 || RPC portmap yppasswd request UDP || arachnids,14590 || RPC portmap ypserv request UDP || arachnids,12 || bugtraq,5914 || bugtraq,6016 || cve,2000-1042 || cve,2000-1043 || cve,2002-1232591 || RPC portmap ypupdated request TCP || arachnids,125592 || RPC rstatd query || arachnids,9593 || RPC portmap snmpXdmi request TCP || bugtraq,2417 || cve,2001-0236 || url,www.cert.org/advisories/CA-2001-05.html595 || RPC portmap espd request TCP || bugtraq,2714 || cve,2001-0331596 || RPC portmap listing || arachnids,429597 || RPC portmap listing || arachnids,429598 || RPC portmap listing TCP 111 || arachnids,428599 || RPC portmap listing TCP 32771 || arachnids,429600 || RPC EXPLOIT statdx || arachnids,442601 || RSERVICES rlogin LinuxNIS602 || RSERVICES rlogin bin || arachnids,384603 || RSERVICES rlogin echo++ || arachnids,385604 || RSERVICES rsh froot || arachnids,387605 || RSERVICES rlogin login failure || arachnids,393606 || RSERVICES rlogin root || arachnids,389607 || RSERVICES rsh bin || arachnids,390608 || RSERVICES rsh echo + + || arachnids,388609 || RSERVICES rsh froot || arachnids,387610 || RSERVICES rsh root || arachnids,391611 || RSERVICES rlogin login failure || arachnids,392612 || RPC rusers query UDP || cve,1999-0626613 || SCAN myscan || arachnids,439614 || BACKDOOR hack-a-tack attempt || arachnids,314615 || SCAN SOCKS Proxy attempt || url,help.undernet.org/proxyscan/616 || SCAN ident version request || arachnids,303617 || SCAN ssh-research-scanner618 || SCAN Squid Proxy attempt619 || SCAN cybercop os probe || arachnids,146620 || SCAN Proxy Port 8080 attempt621 || SCAN FIN || arachnids,27622 || SCAN ipEye SYN scan || arachnids,236623 || SCAN NULL || arachnids,4624 || SCAN SYN FIN || arachnids,198625 || SCAN XMAS || arachnids,144626 || SCAN cybercop os PA12 attempt || arachnids,149627 || SCAN cybercop os SFU12 probe || arachnids,150628 || SCAN nmap TCP || arachnids,28629 || SCAN nmap fingerprint attempt || arachnids,05630 || SCAN synscan portscan || arachnids,441631 || SMTP ehlo cybercop attempt || arachnids,372632 || SMTP expn cybercop attempt || arachnids,371634 || SCAN Amanda client version request635 || SCAN XTACACS logout || arachnids,408636 || SCAN cybercop udp bomb || arachnids,363637 || SCAN Webtrends Scanner UDP Probe || arachnids,308638 || SHELLCODE SGI NOOP || arachnids,356639 || SHELLCODE SGI NOOP || arachnids,357640 || SHELLCODE AIX NOOP641 || SHELLCODE Digital UNIX NOOP || arachnids,352642 || SHELLCODE HP-UX NOOP || arachnids,358643 || SHELLCODE HP-UX NOOP || arachnids,359644 || SHELLCODE sparc NOOP || arachnids,345645 || SHELLCODE sparc NOOP || arachnids,353646 || SHELLCODE sparc NOOP || arachnids,355647 || SHELLCODE sparc setuid 0 || arachnids,282648 || SHELLCODE x86 NOOP || arachnids,181649 || SHELLCODE x86 setgid 0 || arachnids,284650 || SHELLCODE x86 setuid 0 || arachnids,436651 || SHELLCODE x86 stealth NOOP || arachnids,291652 || SHELLCODE Linux shellcode || arachnids,343653 || SHELLCODE x86 0x90 unicode NOOP654 || SMTP RCPT TO overflow || bugtraq,2283 || bugtraq,9696 || cve,2001-0260655 || SMTP sendmail 8.6.9 exploit || arachnids,140 || bugtraq,2311 || cve,1999-0204656 || SMTP EXPLOIT x86 windows CSMMail overflow || bugtraq,895 || cve,2000-0042657 || SMTP chameleon overflow || arachnids,266 || bugtraq,2387 || cve,1999-0261658 || SMTP exchange mime DOS || bugtraq,1869 || cve,2000-1006 || nessus,10558 || url,www.microsoft.com/technet/security/bulletin/MS00-082.mspx659 || SMTP expn decode || arachnids,32 || cve,1999-0096 || nessus,10248660 || SMTP expn root || arachnids,31 || cve,1999-0531 || nessus,10249661 || SMTP majordomo ifs || arachnids,143 || bugtraq,2310 || cve,1999-0207662 || SMTP sendmail 5.5.5 exploit || arachnids,119 || cve,1999-0203 || nessus,10258663 || SMTP rcpt to command attempt || arachnids,172 || bugtraq,1 || cve,1999-0095664 || SMTP RCPT TO decode attempt || arachnids,121 || bugtraq,2308 || cve,1999-0203665 || SMTP sendmail 5.6.5 exploit || arachnids,122 || bugtraq,2308 || cve,1999-0203666 || SMTP sendmail 8.4.1 exploit || arachnids,120667 || SMTP sendmail 8.6.10 exploit || arachnids,123 || bugtraq,2311 || cve,1999-0204668 || SMTP sendmail 8.6.10 exploit || arachnids,124 || bugtraq,2311 || cve,1999-0204669 || SMTP sendmail 8.6.9 exploit || arachnids,142 || bugtraq,2311 || cve,1999-0204670 || SMTP sendmail 8.6.9 exploit || arachnids,139 || bugtraq,2311 || cve,1999-0204671 || SMTP sendmail 8.6.9c exploit || arachnids,141 || bugtraq,2311 || cve,1999-0204672 || SMTP vrfy decode || arachnids,373 || bugtraq,10248 || cve,1999-0096673 || MS-SQL sp_start_job - program execution674 || MS-SQL xp_displayparamstmt possible buffer overflow || bugtraq,2030 || cve,2000-1081 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx675 || MS-SQL xp_setsqlsecurity possible buffer overflow || bugtraq,2043 || cve,2000-1088 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx676 || MS-SQL/SMB sp_start_job - program execution677 || MS-SQL/SMB sp_password password change678 || MS-SQL/SMB sp_delete_alert log file deletion679 || MS-SQL/SMB sp_adduser database user creation680 || MS-SQL/SMB sa login failed || bugtraq,4797 || cve,2000-1209681 || MS-SQL/SMB xp_cmdshell program execution682 || MS-SQL xp_enumresultset possible buffer overflow || bugtraq,2031 || cve,2000-1082 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx683 || MS-SQL sp_password - password change684 || MS-SQL sp_delete_alert log file deletion685 || MS-SQL sp_adduser - database user creation686 || MS-SQL xp_reg* - registry access || bugtraq,5205 || cve,2002-0642 || nessus,10642 || url,www.microsoft.com/technet/security/bulletin/MS02-034687 || MS-SQL xp_cmdshell - program execution688 || MS-SQL sa login failed || bugtraq,4797 || cve,2000-1209 || nessus,10673689 || MS-SQL/SMB xp_reg* registry access || bugtraq,5205 || cve,2002-0642 || nessus,10642 || url,www.microsoft.com/technet/security/bulletin/MS02-034690 || MS-SQL/SMB xp_printstatements possible buffer overflow || bugtraq,2041 || cve,2000-1086 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx691 || MS-SQL shellcode attempt692 || MS-SQL/SMB shellcode attempt693 || MS-SQL shellcode attempt694 || MS-SQL/SMB shellcode attempt695 || MS-SQL/SMB xp_sprintf possible buffer overflow || bugtraq,1204 || url,www.microsoft.com/technet/security/bulletin/MS01-060.mspx696 || MS-SQL/SMB xp_showcolv possible buffer overflow || bugtraq,2038 || cve,2000-1083 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx697 || MS-SQL/SMB xp_peekqueue possible buffer overflow || bugtraq,2040 || cve,2000-1085 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx698 || MS-SQL/SMB xp_proxiedmetadata possible buffer overflow || bugtraq,2042 || cve,2000-1087 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx699 || MS-SQL xp_printstatements possible buffer overflow || bugtraq,2041 || cve,2000-1086 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx700 || MS-SQL/SMB xp_updatecolvbm possible buffer overflow || bugtraq,2039 || cve,2000-1084 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx701 || MS-SQL xp_updatecolvbm possible buffer overflow || bugtraq,2039 || cve,2000-1084 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx702 || MS-SQL/SMB xp_displayparamstmt possible buffer overflow || bugtraq,2030 || cve,2000-1081 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx703 || MS-SQL/SMB xp_setsqlsecurity possible buffer overflow || bugtraq,2043 || cve,2000-1088 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx704 || MS-SQL xp_sprintf possible buffer overflow || bugtraq,1204 || cve,2001-0542 || url,www.microsoft.com/technet/security/bulletin/MS01-060.mspx705 || MS-SQL xp_showcolv possible buffer overflow || bugtraq,2038 || cve,2000-1083 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx706 || MS-SQL xp_peekqueue possible buffer overflow || bugtraq,2040 || cve,2000-1085 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx707 || MS-SQL xp_proxiedmetadata possible buffer overflow || bugtraq,2024 || cve,1999-0287 || cve,2000-1087 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx708 || MS-SQL/SMB xp_enumresultset possible buffer overflow || bugtraq,2031 || cve,2000-1082 || url,www.microsoft.com/technet/security/bulletin/MS00-092.mspx709 || TELNET 4Dgifts SGI account attempt || cve,1999-0501 || nessus,11243710 || TELNET EZsetup account attempt || cve,1999-0501 || nessus,11244711 || TELNET SGI telnetd format bug || arachnids,304 || bugtraq,1572 || cve,2000-0733712 || TELNET ld_library_path || arachnids,367 || bugtraq,459 || cve,1999-0073713 || TELNET livingston DOS || arachnids,370 || bugtraq,2225 || cve,1999-0218714 || TELNET resolv_host_conf || arachnids,369 || bugtraq,2181 || cve,2001-0170715 || TELNET Attempted SU from wrong group716 || INFO TELNET access || arachnids,08 || cve,1999-0619 || nessus,10280717 || TELNET not on console || arachnids,365718 || INFO TELNET login incorrect || arachnids,127719 || TELNET root login
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -