Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Bojan Zdrnja
Threat Level:
green
Date
Author
Title
PENTEST TOOLS AND TECHNIQUES
2014-08-12
Adrien de Beaupre
Host discovery with nmap
PENTEST
2019-11-29/a>
Russ McRee
ISC Snapshot: Search with SauronEye
2018-01-28/a>
Didier Stevens
Is this a pentest?
2017-09-06/a>
Adrien de Beaupre
Modern Web Application Penetration Testing , Hash Length Extension Attacks
2017-05-05/a>
Xavier Mertens
HTTP Headers... the Achilles' heel of many applications
2016-11-02/a>
Rob VandenBrink
What Does a Pentest Look Like?
2016-09-28/a>
Xavier Mertens
SNMP Pwn3ge
2016-01-20/a>
Xavier Mertens
/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-11-09/a>
John Bambenek
ICYMI: Widespread Unserialize Vulnerability in Java
2015-10-27/a>
Xavier Mertens
The "Yes, but..." syndrome
2014-08-12/a>
Adrien de Beaupre
Host discovery with nmap
2013-08-21/a>
Rob VandenBrink
Fibre Channel Reconnaissance - Reloaded
2011-08-26/a>
Daniel Wesemann
User Agent 007
2010-11-19/a>
Jason Lam
Exchanging and sharing of assessment results
2010-06-06/a>
Manuel Humberto Santander Pelaez
Nice OS X exploit tutorial
2010-02-22/a>
Rob VandenBrink
New Risks in Penetration Testing
2009-05-31/a>
Tony Carothers
L0phtcrack is Back!
TOOLS
2024-10-24/a>
Johannes Ullrich
Development Features Enabled in Prodcution
2024-09-30/a>
Jim Clausing
Tool update: mac-robber.py and le-hex-to-ip.py
2024-06-15/a>
Didier Stevens
Overview of My Tools That Handle JSON Data
2023-07-24/a>
Rob VandenBrink
JQ: Another Tool We Thought We Knew
2023-07-01/a>
Russ McRee
Sandfly Security
2022-03-24/a>
Xavier Mertens
Malware Delivered Through Free Sharing Tool
2021-10-08/a>
Rob VandenBrink
Sorting Things Out - Sorting Data by IP Address
2020-06-11/a>
Xavier Mertens
Anti-Debugging JavaScript Techniques
2019-05-10/a>
Xavier Mertens
DSSuite - A Docker Container with Didier's Tools
2018-11-11/a>
Pasquale Stirparo
Community contribution: joining forces or multiply solutions?
2018-10-10/a>
Xavier Mertens
"OG" Tools Remain Valuable
2018-08-05/a>
Didier Stevens
Video: Maldoc analysis with standard Linux tools
2018-07-30/a>
Xavier Mertens
Exploiting the Power of Curl
2017-09-19/a>
Jim Clausing
New tool: mac-robber.py
2017-01-12/a>
Mark Baggett
System Resource Utilization Monitor
2017-01-12/a>
Mark Baggett
Some tools updates
2017-01-07/a>
Xavier Mertens
Using Security Tools to Compromize a Network
2016-02-06/a>
Jim Clausing
More updates to kippo-log2db
2015-02-19/a>
Daniel Wesemann
Macros? Really?!
2015-02-07/a>
Jim Clausing
Update to kippo-log2db.pl
2014-11-05/a>
Russ McRee
Tool Tip: vFeed
2014-09-14/a>
Jim Clausing
SSDEEP update
2014-08-12/a>
Adrien de Beaupre
Host discovery with nmap
2013-11-19/a>
Jim Clausing
Updated dumpdns.pl
2013-06-18/a>
Russ McRee
EMET 4.0 is now available for download
2013-06-05/a>
Richard Porter
Windows Sysinternals Updated http://technet.microsoft.com/en-us/sysinternals/default.aspx
2013-05-11/a>
Lenny Zeltser
Extracting Digital Signatures from Signed Malware
2013-02-03/a>
Lorna Hutcheson
Is it Really an Attack?
2012-05-06/a>
Jim Clausing
Tool updates and Win 8
2011-08-22/a>
Jim Clausing
Are your tools ready for IPv6? (part 2)
2011-08-04/a>
Jim Clausing
Are your tools ready for IPv6? (part 1)
2010-12-30/a>
Rick Wanner
SamuraiWTF Review over at ISSA Toolsmith
2010-12-09/a>
Mark Hofman
Having a look at the DDOS tool used in the attacks today
2010-12-05/a>
Jim Clausing
Updates to a couple of Sysinternals tools
2010-10-20/a>
Jim Clausing
Tools updates - Oct 2010
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-08-09/a>
Jim Clausing
Free/inexpensive tools for monitoring systems/networks
2010-07-13/a>
Jim Clausing
Forensic challenge results
2010-05-28/a>
Jim Clausing
Wireshark SMB file extraction plug-in
2010-03-30/a>
Marcus Sachs
Zigbee Analysis Tools
2010-03-30/a>
Pedro Bueno
Sharing the Tools
2010-01-19/a>
Jim Clausing
Forensic challenges
2010-01-06/a>
Johannes Ullrich
New Tool: IPv6 conversions http://isc.sans.org/tools/ipv6.html
2009-11-26/a>
Tony Carothers
What Are You Thankful For?
2009-11-25/a>
Jim Clausing
Tool updates
2009-09-24/a>
Jim Clausing
A couple more tools
2009-05-25/a>
Jim Clausing
More tools for (US) Memorial Day
2009-03-01/a>
Jim Clausing
Cool combination of tools
2008-12-13/a>
Jim Clausing
Followup from last shift and some research to do.
2008-11-17/a>
Jim Clausing
How are you coming with that IPv6 migration?
2008-11-13/a>
Jim Clausing
Some recently updated tools
2008-09-22/a>
Jim Clausing
More on tools/resources/blogs
2008-09-07/a>
Lorna Hutcheson
Malware Analysis: Tools are only so good
2008-07-11/a>
Jim Clausing
Updates to some of our favorite tools
AND
2024-08-23/a>
Jesse La Grew
Pandas Errors: What encoding are my logs in?
2024-07-16/a>
Guy Bruneau
Who You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-07-10/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-29/a>
Johannes Ullrich
D-Link NAS Device Backdoor Abused
2024-02-20/a>
Xavier Mertens
Python InfoStealer With Dynamic Sandbox Detection
2023-10-31/a>
Xavier Mertens
Multiple Layers of Anti-Sandboxing Techniques
2023-07-01/a>
Russ McRee
Sandfly Security
2023-06-11/a>
Guy Bruneau
DShield Honeypot Activity for May 2023
2023-05-24/a>
Tom Webb
IR Case/Alert Management
2023-03-12/a>
Guy Bruneau
AsynRAT Trojan - Bill Payment (Pago de la factura)
2022-09-26/a>
Xavier Mertens
Easy Python Sandbox Detection
2022-08-22/a>
Xavier Mertens
32 or 64 bits Malware?
2022-06-03/a>
Xavier Mertens
Sandbox Evasion... With Just a Filename!
2021-12-06/a>
Xavier Mertens
The Importance of Out-of-Band Networks
2021-04-02/a>
Xavier Mertens
C2 Activity: Sandboxes or Real Victims?
2021-02-13/a>
Guy Bruneau
vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-05/a>
Xavier Mertens
VBA Macro Trying to Alter the Application Menus
2020-09-16/a>
Johannes Ullrich
Do Vulnerabilities Ever Get Old? Recent "Mirai" Variant Scanning for 20 Year Old Amanda Version?
2020-09-03/a>
Xavier Mertens
Sandbox Evasion Using NTP
2020-04-16/a>
Johannes Ullrich
Using AppLocker to Prevent Living off the Land Attacks
2020-02-14/a>
Xavier Mertens
Keep an Eye on Command-Line Browsers
2020-02-07/a>
Xavier Mertens
Sandbox Detection Tricks & Nice Obfuscation in a Single VBScript
2019-07-16/a>
Russ McRee
Commando VM: The Complete Mandiant Offensive VM
2019-01-10/a>
Brad Duncan
Heartbreaking Emails: "Love You" Malspam
2018-08-01/a>
Johannes Ullrich
When Cameras and Routers attack Phones. Spike in CVE-2014-8361 Exploits Against Port 52869
2018-07-30/a>
Xavier Mertens
Exploiting the Power of Curl
2018-07-24/a>
Brad Duncan
Recent Emotet activity
2018-05-02/a>
Russ McRee
Windows Commands Reference - An InfoSec Must Have
2017-01-06/a>
John Bambenek
Great Misadventures of Security Vendors: Absurd Sandboxing Edition
2017-01-05/a>
John Bambenek
New Year's Resolution: Build Your Own Malware Lab?
2016-12-10/a>
Didier Stevens
Sleeping VBS Really Wants To Sleep
2016-07-26/a>
Johannes Ullrich
Command and Control Channels Using "AAAA" DNS Records
2016-06-22/a>
Bojan Zdrnja
Security through obscurity never works
2016-05-02/a>
Rick Wanner
Fake Chrome update for Android
2016-04-15/a>
Xavier Mertens
Windows Command Line Persistence?
2015-12-16/a>
Xavier Mertens
Playing With Sandboxes Like a Boss
2015-12-05/a>
Guy Bruneau
Are you looking to setup your own Malware Sandbox?
2015-12-04/a>
Tom Webb
Automating Phishing Analysis using BRO
2015-10-12/a>
Guy Bruneau
Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2015-07-28/a>
Rick Wanner
Android Stagefright multimedia viewer prone to remote exploitation
2015-04-27/a>
Richard Porter
When Prevention Fails, Incident Response Begins
2014-09-12/a>
Chris Mohan
Are credential dumps worth reviewing?
2014-08-12/a>
Adrien de Beaupre
Host discovery with nmap
2014-08-04/a>
Russ McRee
Threats & Indicators: A Security Intelligence Lifecycle
2014-05-01/a>
Johannes Ullrich
Microsoft Announces Special Patch for IE 0-day (Win XP included!)
2014-04-26/a>
Guy Bruneau
Android Users - Beware of Bitcoin Mining Malware
2014-04-05/a>
Jim Clausing
Those strange e-mails with URLs in them can lead to Android malware
2014-04-01/a>
Basil Alawi S.Taher
Upgrading Your Android, Elevating My Malware
2014-03-11/a>
Basil Alawi S.Taher
Introduction to Memory Analysis with Mandiant Redline
2014-02-10/a>
Rob VandenBrink
Isn't it About Time to Get Moving on Chip and PIN?
2014-02-07/a>
Rob VandenBrink
New ISO Standards on Vulnerability Handling and Disclosure
2014-01-23/a>
Chris Mohan
Learning from the breaches that happens to others Part 2
2013-12-05/a>
Mark Hofman
Updated Standards Part 1 - ISO 27001
2013-09-23/a>
Rob VandenBrink
How do you spell "PSK"?
2013-02-22/a>
Chris Mohan
PHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-17/a>
Guy Bruneau
HP ArcSight Connector Appliance and Logger Vulnerabilities
2013-01-30/a>
Richard Porter
Getting Involved with the Local Community
2013-01-14/a>
Richard Porter
January 2013 Microsoft Out of Cycle Patch
2013-01-08/a>
Jim Clausing
Cuckoo 0.5 is out and the world didn't end
2012-12-13/a>
Johannes Ullrich
What if Tomorrow Was the Day?
2012-10-24/a>
Russ McRee
Cyber Security Awareness Month - Day 24 - A Standard for Information Security Incident Management - ISO 27035
2012-10-23/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 23: Character Encoding Standards - ASCII and Successors
2012-10-17/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 17 - A Standard for Risk Management - ISO 27005
2012-10-12/a>
Mark Hofman
Cyber Security Awareness Month - Day 12 PCI DSS
2012-10-11/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 11 - Vendor Agnostic Standards (Center for Internet Security)
2012-10-09/a>
Johannes Ullrich
Cyber Security Awreness Month - Day 9 - Request for Comment (RFC)
2012-05-18/a>
Johannes Ullrich
ZTE Score M Android Phone backdoor
2012-04-23/a>
Russ McRee
Emergency Operations Centers & Security Incident Management: A Correlation
2012-03-03/a>
Jim Clausing
New automated sandbox for Android malware
2011-11-03/a>
Richard Porter
An Apple, Inc. Sandbox to play in.
2011-11-01/a>
Russ McRee
Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released
2011-10-29/a>
Richard Porter
The Sub Critical Control? Evidence Collection
2011-09-15/a>
Johannes Ullrich
SSH Vandals?
2011-09-07/a>
Lenny Zeltser
Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2011-05-18/a>
Bojan Zdrnja
Android, HTTP and authentication tokens
2011-03-22/a>
Chris Mohan
Read only USB stick trick
2011-03-03/a>
Manuel Humberto Santander Pelaez
Rogue apps inside Android Marketplace
2011-01-08/a>
Guy Bruneau
PandaLabs 2010 Annual Report
2010-12-31/a>
Bojan Zdrnja
Android malware enters 2011
2010-11-19/a>
Jason Lam
Adobe Reader X - Sandbox
2010-10-19/a>
Rob VandenBrink
Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-08-04/a>
Tom Liston
Incident Reporting - Liston's "How-To" Guide
2010-07-25/a>
Rick Wanner
Updated version of Mandiant's Web Historian
2010-07-21/a>
Adrien de Beaupre
Adobe Reader Protected Mode
2010-02-07/a>
Rick Wanner
Mandiant Mtrends Report
2010-02-06/a>
Guy Bruneau
LANDesk Management Gateway Vulnerability
2010-01-27/a>
Raul Siles
Command Line Kung Fu
2010-01-21/a>
Chris Carboni
* Microsoft Out Of Band Patch Release
2010-01-11/a>
Johannes Ullrich
Fake Android Application
2009-07-24/a>
Rick Wanner
Microsoft Out of Band Patch
2009-06-11/a>
Rick Wanner
WHO Declares Flu A(H1N1) a Pandemic
2009-05-19/a>
Rick Wanner
New Version of Mandiant Highlighter
2009-05-01/a>
Adrien de Beaupre
Incident Management
2009-04-26/a>
Johannes Ullrich
Pandemic Preparation - Swine Flu
2009-04-16/a>
Adrien de Beaupre
Incident Response vs. Incident Handling
2009-04-07/a>
Johannes Ullrich
Common Apache Misconception
2009-02-05/a>
Rick Wanner
Mandiant Memoryze review, Hilighter, other Mandiant tools!
2008-11-25/a>
Andre Ludwig
Tmobile G1 handsets having DNS problems?
2008-10-29/a>
Deborah Hale
Day 29 - Should I Switch Software Vendors?
2008-10-23/a>
Mark Hofman
Microsoft out-of-band patch - Severity Critical
2008-09-09/a>
Swa Frantzen
wordpress upgrade
2008-08-09/a>
Deborah Hale
Cleveland Outage
TECHNIQUES
2014-08-12/a>
Adrien de Beaupre
Host discovery with nmap
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Keep yourself informed with our
aggregate InfoSec news