SlideShare a Scribd company logo
Threat Report
MOI-PAN01 : 2013/04/22 22:14:37 - 2013/04/23 10:14:36
Threat/Content Name ID Threat/Content Type Severity Action IP Protocol Repeat Count
Microsoft remote desktop connect initial attempt 33020 vulnerability informational alert tcp 7.34 k
Morto RDP Request Traffic 13274 spyware low alert tcp 7.27 k
Microsoft Windows SMB Negotiate Request 35364 vulnerability informational alert tcp 4.31 k
Windows SMB Login Attempt 31696 vulnerability informational alert tcp 4.21 k
MS-RDP Brute-force Attempt 40021 vulnerability high drop-all-packets tcp 3.31 k
ZeroAccess.Gen Command and Control Traffic 13235 spyware critical drop-all-packets udp 3.12 k
MSSQL DB Login Authentication Failed 31753 vulnerability informational alert tcp 2.56 k
HTTP Unauthorized Error 34556 vulnerability informational alert tcp 1.79 k
HTTP WWW-Authentication Failed 31708 vulnerability informational alert tcp 1.78 k
HTTP OPTIONS Method 30520 vulnerability informational alert tcp 1.09 k
Bot: Torpig Phone Home DNS request 12657 spyware medium drop-all-packets udp 997
HTTP Request ACE Encoded Domain Name Access 31298 vulnerability informational alert tcp 641
SSL Renegotiation Denial of Service Vulnerability 33862 vulnerability low alert tcp 621
SMB: User Password Brute-force Attempt 40004 vulnerability high drop-all-packets tcp 367
Microsoft SQL Server User Authentication Brute-force Attempt 40010 vulnerability high drop-all-packets tcp 347
Microsoft Windows Server Service Remote Stack Overflow Vulnerability 31922 vulnerability critical drop-all-packets tcp 306
Windows Server Service NetrpPathCanonicalize access 30859 vulnerability low alert tcp 306
NetBIOS nbtstat query 31707 vulnerability informational alert udp 283
Suspicious or malformed HTTP Referer field 35554 vulnerability informational alert tcp 271
Microsoft ASP.Net Information Leak Vulnerability 33435 vulnerability low alert tcp 234
SSH2 Login Attempt 31914 vulnerability informational alert tcp 190
Suspicious user-agent strings 10004 spyware medium drop-all-packets tcp 145
MySQL Login Authentication Failed 31719 vulnerability informational alert tcp 138
SIP Register Request Attempt 33592 vulnerability low alert udp 136
Generic GET Method Buffer Overflow Vulnerability 34267 vulnerability informational alert tcp 86
http://www.paloaltonetworks.com

More Related Content

Similar to Report (10)

Common ports
Common portsCommon ports
Common ports
munaatyaf
 
Common port
Common portCommon port
Common port
Trường Tiền
 
Common Ports .pdf
Common Ports .pdfCommon Ports .pdf
Common Ports .pdf
ssuser822927
 
Common ports
Common portsCommon ports
Common ports
Swapan Das
 
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
BIWUG
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
Adam Pennington
 
Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
fangjiafu
 
Stu t17 a
Stu t17 aStu t17 a
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use Them
Sneha Inguva
 
Spca2014 advanced share point troubleshooting hessing
Spca2014 advanced share point troubleshooting hessingSpca2014 advanced share point troubleshooting hessing
Spca2014 advanced share point troubleshooting hessing
NCCOMMS
 
ATT&CK BINGO
ATT&CK BINGOATT&CK BINGO
ATT&CK BINGO
Adam Pennington
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Networking
Networking Networking
Networking
Strobe Technologies
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
Prathan Phongthiproek
 
SANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
APNIC
 
Cyber-security
Cyber-securityCyber-security
Cyber-security
Qasim Zaidi
 
Network security
Network securityNetwork security
DFIR Training: RDP Triage
DFIR Training: RDP TriageDFIR Training: RDP Triage
DFIR Training: RDP Triage
Christopher Gerritz
 
Common Ports
Common PortsCommon Ports
Common Ports
SMKN 3 Kota Tangerang
 
Common ports
Common portsCommon ports
Common ports
Mohamed Gamel
 

Similar to Report (10) (20)

Common ports
Common portsCommon ports
Common ports
 
Common port
Common portCommon port
Common port
 
Common Ports .pdf
Common Ports .pdfCommon Ports .pdf
Common Ports .pdf
 
Common ports
Common portsCommon ports
Common ports
 
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
SharePoint Saturday Belgium 2014 SP2013 - Advanced troubleshooting and perfor...
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
 
Layer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacksLayer one 2011-gh0stwood-d-dos-attacks
Layer one 2011-gh0stwood-d-dos-attacks
 
Stu t17 a
Stu t17 aStu t17 a
Stu t17 a
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use Them
 
Spca2014 advanced share point troubleshooting hessing
Spca2014 advanced share point troubleshooting hessingSpca2014 advanced share point troubleshooting hessing
Spca2014 advanced share point troubleshooting hessing
 
ATT&CK BINGO
ATT&CK BINGOATT&CK BINGO
ATT&CK BINGO
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Networking
Networking Networking
Networking
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 
SANOG 40: DDoS in South Asia
SANOG 40: DDoS in South AsiaSANOG 40: DDoS in South Asia
SANOG 40: DDoS in South Asia
 
Cyber-security
Cyber-securityCyber-security
Cyber-security
 
Network security
Network securityNetwork security
Network security
 
DFIR Training: RDP Triage
DFIR Training: RDP TriageDFIR Training: RDP Triage
DFIR Training: RDP Triage
 
Common Ports
Common PortsCommon Ports
Common Ports
 
Common ports
Common portsCommon ports
Common ports
 

More from PePae Loeicity

Top applications
Top applicationsTop applications
Top applications
PePae Loeicity
 
Trlc proj 01_2555_version_01
Trlc proj 01_2555_version_01Trlc proj 01_2555_version_01
Trlc proj 01_2555_version_01
PePae Loeicity
 
รู้จักกับ ทรู คอร์ปอเรชั่น New
รู้จักกับ ทรู คอร์ปอเรชั่น Newรู้จักกับ ทรู คอร์ปอเรชั่น New
รู้จักกับ ทรู คอร์ปอเรชั่น NewPePae Loeicity
 

More from PePae Loeicity (6)

Top applications
Top applicationsTop applications
Top applications
 
Trlc proj 01_2555_version_01
Trlc proj 01_2555_version_01Trlc proj 01_2555_version_01
Trlc proj 01_2555_version_01
 
Truecorporation
TruecorporationTruecorporation
Truecorporation
 
Title
TitleTitle
Title
 
ปก
ปกปก
ปก
 
รู้จักกับ ทรู คอร์ปอเรชั่น New
รู้จักกับ ทรู คอร์ปอเรชั่น Newรู้จักกับ ทรู คอร์ปอเรชั่น New
รู้จักกับ ทรู คอร์ปอเรชั่น New
 

Report (10)

  • 1. Threat Report MOI-PAN01 : 2013/04/22 22:14:37 - 2013/04/23 10:14:36 Threat/Content Name ID Threat/Content Type Severity Action IP Protocol Repeat Count Microsoft remote desktop connect initial attempt 33020 vulnerability informational alert tcp 7.34 k Morto RDP Request Traffic 13274 spyware low alert tcp 7.27 k Microsoft Windows SMB Negotiate Request 35364 vulnerability informational alert tcp 4.31 k Windows SMB Login Attempt 31696 vulnerability informational alert tcp 4.21 k MS-RDP Brute-force Attempt 40021 vulnerability high drop-all-packets tcp 3.31 k ZeroAccess.Gen Command and Control Traffic 13235 spyware critical drop-all-packets udp 3.12 k MSSQL DB Login Authentication Failed 31753 vulnerability informational alert tcp 2.56 k HTTP Unauthorized Error 34556 vulnerability informational alert tcp 1.79 k HTTP WWW-Authentication Failed 31708 vulnerability informational alert tcp 1.78 k HTTP OPTIONS Method 30520 vulnerability informational alert tcp 1.09 k Bot: Torpig Phone Home DNS request 12657 spyware medium drop-all-packets udp 997 HTTP Request ACE Encoded Domain Name Access 31298 vulnerability informational alert tcp 641 SSL Renegotiation Denial of Service Vulnerability 33862 vulnerability low alert tcp 621 SMB: User Password Brute-force Attempt 40004 vulnerability high drop-all-packets tcp 367 Microsoft SQL Server User Authentication Brute-force Attempt 40010 vulnerability high drop-all-packets tcp 347 Microsoft Windows Server Service Remote Stack Overflow Vulnerability 31922 vulnerability critical drop-all-packets tcp 306 Windows Server Service NetrpPathCanonicalize access 30859 vulnerability low alert tcp 306 NetBIOS nbtstat query 31707 vulnerability informational alert udp 283 Suspicious or malformed HTTP Referer field 35554 vulnerability informational alert tcp 271 Microsoft ASP.Net Information Leak Vulnerability 33435 vulnerability low alert tcp 234 SSH2 Login Attempt 31914 vulnerability informational alert tcp 190 Suspicious user-agent strings 10004 spyware medium drop-all-packets tcp 145 MySQL Login Authentication Failed 31719 vulnerability informational alert tcp 138 SIP Register Request Attempt 33592 vulnerability low alert udp 136 Generic GET Method Buffer Overflow Vulnerability 34267 vulnerability informational alert tcp 86 http://www.paloaltonetworks.com