You are on page 1of 3

A Command-And-Control [C&C] Server: Command and Control - C2

Adminstartor Privilage Gain: Administrator Privilege Gain


Administrator Privilege Gain: Administrator Privilege Gain
Administer Privilege Gain: Administrator Privilege Gain
Adware: Adware
A Network Trojan: Network Trojan
A Network Trojan Was Detected: Network Trojan
Apache Log4J Rce Attempt: Apache Log4J Attack
Attempted Administrator Privilege Gain: Administrator Privilege Gain
Attempt To Information Leak: Information Leak
Attempted User Privilege Gain: Administrator Privilege Gain
Attempted Information Leak: Information Leak
Attampted Adminstration Privilage Gain: Administrator Privilege Gain
Attempted Gain Adminstartion Privilage: Administrator Privilege Gain
Attempt To Use Privilage Gain: Administrator Privilege Gain
Attempted Denial Of Service: Denial of Service
Backdoors: Backdoor
Botnet: Botnet
Bots: Botnet
Brute-Force Attack: Brute-Force
Brute Force: Brute-Force
Bypass: Bypass
Bypass Attempt: Bypass
C2 Detected: Command and Control - C2
Code Injection: Code Injection
Collision Attack: Collision Attack
Command Excuttion Attempt: Command Execution
Command Execution: Command Execution
Contains Pwd= In Cleartext: Password in Cleartext
Cross Site Scripting Attempt: Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS): Cross-Site Scripting (XSS)
Cryptojacking: Cryptojacking
Cve-2021-44228 Exploitation Attacks: Exploit/Bypass
Ddos: Distributed Denial-of-Service
Distributed Denial-of-Service (DDoS): Distributed Denial-of-Service
Domain Name Server (DNS) spoofing: Domain Name Server (DNS) Spoofing
DNS Tunneling: DNS Tunneling
Domain Observed Used For C2 Detected: Command and Control - C2
Denial-of-Service (DoS): Denial of Service
Dos Attempt: Denial of Service
Dos: Denial of Service
Eavesdropping: Eavesdropping
Emotet: Emotet
Etc Trickbot Command And Control: Command and Control - C2
Et Scan Potential Ssh Scan Outbound: Potential SSH Scan Outbound
Exploit: Exploit/Bypass
Exploit/Bypass: Exploit/Bypass
Exploit And Remote Shell Excution: Exploit/Bypass
Http Code Poisoning: HTTP Code Poisoning
Http Code Po Isoning /A Cross Site Scripting Att Ack: HTTP Code Poisoning
ICMP flood: ICMP Flood
Information Loss: Information Leak
Injection Attavck: Injection
Keylogger: Keylogger
Ldap Server Binding: LDAP Server Binding
Login Attempt: Login Attempt
Log4J Issue: Apache Log4J Attack
Login: Login Attempt
Majestic12: Botnet
Malware Command And Control Activity Detected: Command and Control - C2
Malware/Maliciou Scan: Malicious Scan
Malicious Code Attempt: Malicious Code Attempt
Malwre: Malware
Malware/Adware: Adware
Malware Command And Control Activity: Command and Control - C2
Malware Attempt: Malware
Malwrae: Malware
Malwa Re: Malware
Malicious: Malware
Malware(Malicious): Malware
Malwar: Malware
Malware Compromisation (Misc Attack): Malware Compromise
Malware: Malware
Man-in-the-Middle: Man-in-the-Middle
Misc Attack: Hostile Host Traffic
Mis Attack: Hostile Host Traffic
Network Attacks: Network Attack
Network: Network Attack
Network Trojan Was Detected: Network Trojan
Network Scan: Network Scan
Network Trojn Attacke: Network Trojan
Network Trojan: Network Trojan
OS command injection: OS Command Injection
Pass= In Clear Text: Password in Cleartext
Phishing: Phishing
Port Scan: Port Scan
Potentially Bad Traffic: Bad Traffic
Potential Corporate Privacy Violation: Privacy Violation
Privacy Violation: Privacy Violation
Privilege Gain: Privilege Gain
Protocol-Command-Decode: Protocol-Command-Decode
Ql Injection Attempt And Cross Site Scripting Attempt: SQL Injection
Ransomware: Ransomware
Rce Attempt: Remote Code Execution
Rce: Remote Code Execution
Rdp Attacks: Remote Code Execution
Rdp: Remote Code Execution
Remote Code Execution: Remote Code Execution
Saspicious Scan: Scan
Scanning: Scan
Scanning (Misc-Activity): Scan
Scann: Scan
Scan: Scan
Scan/Bypass: Scan/Bypass
Security By Pass Attempt: Bypass
Session Hijacking: Session Hijacking
Sha1 Hash: Malicious SSL Certificate
Shell Command: Shell Command Execution
Shell Command Execution Attempt: Shell Command Execution
Shell Command Execution: Shell Command Execution
Shell: Shell Command Execution
Shell Execution Attempt: Shell Command Execution
Spam: Spam
Spear-Phishing: Spear-Phishing
Spoofing: Spoofing
Spyware: Spyware
Sql Injection Attempt: SQL Injection
Sql Injection: SQL Injection
SQL Injection: SQL Injection
Sqli Attempt: SQL Injection
Ssh Scan: SSH Scan
SYN flood: SYN Flood
Trojan Horses: Trojan Horse
Trojan(Malware): Trojan Horse
Trojan: Trojan Horse
URL Interpretation: URL Interpretation
Watering Hole: Watering Hole
Web Aplication Attack: Web Application Attack
Web Application Attackweb Application Attack: Web Application Attack
Web Shel: Web Shell
Web Application Attack Attempted Administrator Privilege Gain: Web Server Attack
Web Attack: Web Attack
Webshell: Web Shell
Web Application Attack: Web Application Attack
Web Application Attack Attempt: Web Application Attack
Web Application Attack Scanning: Command and Control - C2
Web Server Attack: Web Server Attack
Web Server: Web Server Attack
Web/OS: Web Attack
Web App Attack: Web Application Attack
Webpplication: Web Application Attack
Web Application Atack: Web Application Attack
Web_Se Rver: Web Server Attack
Web_Serv Er: Web Server Attack
Wget Http - Post: Web Attack
Whale-Phishing: Whale-Phishing
Worm: Worm
Xdmcp: XDMCP
Xss Attempt: XSS
Xxe: XXE

You might also like