| 6월 17일 10시 기준 |
|
|
|
|
|
번호 |
|
해킹/취약점명 |
|
점유율 |
|
1 |
|
Host Sweep |
|
33.44 |
|
2 |
|
UDP Tear Drop |
|
30.58 |
|
3 |
|
Ping Sweep |
|
7.37 |
|
4 |
|
Open Tear |
|
6.09 |
|
5 |
|
SMB Service sweep(tcp-445) |
|
5.51 |
|
6 |
|
TCP ACK Flooding |
|
4.65 |
|
7 |
|
FTP Login Fail |
|
2.54 |
|
8 |
|
UDP Flooding |
|
1.50 |
|
9 |
|
SMB Service connect(tcp-445) |
|
1.39 |
|
10 |
|
FTP Login Brute Force |
|
1.39 |
|
11 |
|
Netbios Scan (Messenger, RPC Dcom, MyDoom...) (UDP-137) |
|
1.04 |
|
12 |
|
TCP DRDOS Attack |
|
0.96 |
|
13 |
|
TCP Invalid port |
|
0.80 |
|
14 |
|
Ping Flooding |
|
0.51 |
|
15 |
|
TCP Connect DOS |
|
0.42 |
|
16 |
|
Dcom_TCP_Sweep(MSBlaster Worm, Messenger...) |
|
0.34 |
|
17 |
|
Dcom_ICMP_Sweep(Welchia.worm, ICMP-Type8,Code0) |
|
0.21 |
|
18 |
|
ICMP Unreachable Storm |
|
0.18 |
|
19 |
|
HTTP Login Brute Force |
|
0.16 |
|
20 |
|
Netbios-ns scan (Opaserv.Worm) |
|
0.14 |
|
21 |
|
TCP Invalid flags (maerong) |
|
0.13 |
|
22 |
|
SMB(Netbios) Service Scan (tcp-445) |
|
0.11 |
|
23 |
|
Win32/Slamer.Worm-1 (UDP-1434) |
|
0.08 |
|
24 |
|
SMB(Netbios) Service Scan (tcp-139) |
|
0.08 |
|
25 |
|
Ack Storm |
|
0.05 |
|
26 |
|
Tear Drop |
|
0.05 |
|
27 |
|
NETBIOS Service sweep(tcp-139) |
|
0.04 |
|
28 |
|
FIN Port Scan |
|
0.04 |
|
29 |
|
SMB Login Brute Force |
|
0.03 |
|
30 |
|
TCP SYN Flooding |
|
0.03 |
|
31 |
|
UDP Invalid Data Size |
|
0.02 |
|
32 |
|
SYN Port Scan |
|
0.02 |
|
33 |
|
Opaserv.Worm (Netbios-ssn connection) |
|
0.02 |
|
34 |
|
Trojan Horse Sendmail Distribution or IRC/Flood.k Master(6667/tcp) |
|
0.02 |
|
35 |
|
ICMP Redirect DoS |
|
0.01 |
|
36 |
|
MyDoom Worm-1(NetSky) (TCP-25) |
|
0.01 |
|
37 |
|
TCP Tear Drop |
|
0.01 |
|
38 |
|
UDP Invalid port |
|
0.01 |
|
39 |
|
Secure Shell Brute Force |
|
0.01 |
|
40 |
|
Malicious Javascript Pack-3[Res] |
|
0.0045 |
|
41 |
|
<script (Common XSS Injection -1) |
|
0.0034 |
|
42 |
|
SNMP Brute Force |
|
0.0030 |
|
43 |
|
Telnet Login Fail |
|
0.0028 |
|
44 |
|
Win32/Netsky.worm.J.K-7 (tcp 25) |
|
0.0019 |
|
45 |
|
Windows Terminal Brute Force |
|
0.0015 |
|
46 |
|
IP Invalid Address |
|
0.0014 |
|
47 |
|
/names.nsf (Web server vulnerability) |
|
0.0012 |
|
48 |
|
InstallShield Update Service Agent ActiveX Vuln[Res] |
|
0.0012 |
|
49 |
|
ICMP Ping Of Death |
|
0.0011 |
|
50 |
|
ICMP Invalid Type |
|
0.0010 |
|
51 |
|
MS RPC Dcom long filename heap overflow(TCP135) |
|
0.0007 |
|
52 |
|
Sun Solaris Telnet Remote Authentication Bypass |
|
0.0007 |
|
53 |
|
Microsoft NetpIsRemote() MS06-040 Overflow-4(TCP-139) |
|
0.0007 |
|
54 |
|
DCOM RPC Buffer Overflow(Worm) |
|
0.0006 |
|
55 |
|
/domcfg.nsf (Lotus notes config change) |
|
0.0005 |
|
56 |
|
Sun Solaris Telnet Remote Authentication Bypass(IDS) |
|
0.0005 |
|
57 |
|
not found |
|
0.0003 |
|
58 |
|
Apache HTTPd DoS |
|
0.0003 |
|
59 |
|
Windows Terminal Service |
|
0.0003 |
|
60 |
|
main.cgi ('filename' Variable File Disclosure Vulnerability) |
|
0.0003 |
|
61 |
|
TNS Listener Null Password connect |
|
0.0003 |
|
62 |
|
HTTPD Overflow |
|
0.0003 |
|
63 |
|
Ethereal SMB Malformed Packet DoS |
|
0.0002 |
|
64 |
|
Remote Network File Lister(MS Windows) |
|
0.0002 |
|
65 |
|
MS IE Modal Dialog Zone Bypass Vulnerability |
|
0.0002 |
|
66 |
|
board_skin_path=http:/ (Gnuboard4 "board_skin_path" File Inclusion Vulnerability) |
|
0.0002 |
|
67 |
|
Windows Lsasrv.dll RPC buffer overflow-2 (TCP-445) |
|
0.0002 |
|
68 |
|
Ability Server FTP STOR Buffer Overflow |
|
0.0002 |
|
69 |
|
/count.cgi (Web Server vulnerability) |
|
0.0002 |
|
70 |
|
Win32/Netsky.worm.P.Q-14 (tcp 25) |
|
0.0002 |
|
71 |
|
not found |
|
0.0001 |
|
72 |
|
Apache HTTPd DoS-1 (TCP-80) |
|
0.0001 |
|
73 |
|
login.php?dir=http: (Attack web02 zeroboard login.php vul.) |
|
0.0001 |
|
74 |
|
MS Windows Workstation Service Buffer Overflow-2 (MS06-070) |
|
0.0001 |
|
75 |
|
MS Internet Expolrer BOF Shellcode launcher Response |
|
0.0001 |
|
76 |
|
MS Windows Plug and Play Buffer Overflow-2(TCP-139) |
|
0.0001 |
|
77 |
|
Windows Lsasrv.dll RPC buffer Overflow (TCP-445) |
|
0.0001 |
|
78 |
|
Windows Lsasrv.dll RPC buffer Overflow |
|
0.0001 |
|
79 |
|
Win32/Spammer.Oficla.34304-2 |
|
0.0001 |
|
80 |
|
SQL Query Injection Vulnerability |
|
0.0001 |
댓글