I was thinking at some point of coming up with every vulnerability probe I see and try to classify what they're trying to do, including those that don't even have a protocol associated with them and just throw control characters at the web server. It'd be a lot of work though. Edit: Before I start getting someone with smart comments, yes, I know that the control characters thing is a form of SQL Injection...
... View more