Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: Diaries by Keyword Diaries by Keyword

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

RFI REMOTE FILE INCLUDE

2011-11-28Tom ListonA Puzzlement...
2008-03-13Jason LamRemote File Include spoof!?

RFI

2014-01-17/a>Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-09/a>Bojan ZdrnjaMassive PHP RFI scans
2012-03-07/a>Johannes UllrichWhat happened to RFI attacks?
2011-11-28/a>Tom ListonA Puzzlement...
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2008-03-13/a>Jason LamRemote File Include spoof!?

REMOTE

2019-09-24/a>Xavier MertensHuge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs
2017-11-25/a>Guy BruneauExim Remote Code Exploit
2015-10-12/a>Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-02-16/a>Lorna HutchesonFedora RedHat Vulnerabilty Released
2012-08-22/a>Adrien de BeaupreApple Remote Desktop update fixes no encryption issue
2012-03-16/a>Russ McReeMS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2011-11-28/a>Tom ListonA Puzzlement...
2011-11-19/a>Pedro BuenoDragon Research Group (DRG) announced the white paper entitled "VNC: Threats and Countermeasures" : https://dragonresearchgroup.org/insight/vnc-tac.html
2011-08-11/a>Guy BruneauBlackBerry Enterprise Server Critical Update
2010-12-19/a>Raul SilesIntel's new processors have a remote kill switch (Anti-Theft 3.0)
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote Access Tools
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - VPN and Remote Access Tools
2010-05-12/a>Rob VandenBrinkAdobe Shockwave Update
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-03-10/a>Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-02-02/a>Guy BruneauCisco Secure Desktop Remote XSS Vulnerability
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2008-05-06/a>Marcus SachsIndustrial Control Systems Vulnerability
2008-03-13/a>Jason LamRemote File Include spoof!?
2006-11-20/a>Joel EslerMS06-070 Remote Exploit

FILE

2019-10-03/a>Xavier Mertens"Lost_Files" Ransomware
2019-08-04/a>Didier Stevens Detecting ZLIB Compression
2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2018-11-05/a>Johannes UllrichStruts 2.3 Vulnerable to Two Year old File Upload Flaw
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-10-30/a>Didier StevensPE files and debug info
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-07-02/a>Didier StevensPE Section Name Descriptions
2017-05-26/a>Lorna HutchesonFile2pcap - A new tool for your toolkit!
2016-08-24/a>Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-02-28/a>Daniel WesemannOversharing
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2011-11-28/a>Tom ListonA Puzzlement...
2011-08-15/a>Mark HofmanHow to find unwanted files on workstations
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-08-13/a>Jim ClausingTools for extracting files from pcaps
2009-06-27/a>Tony CarothersNew NIAP Strategy on the Horizon
2009-05-27/a>donald smithHost file black lists
2009-05-25/a>Jim ClausingMore tools for (US) Memorial Day
2008-03-13/a>Jason LamRemote File Include spoof!?

INCLUDE

2011-11-28/a>Tom ListonA Puzzlement...
2008-03-13/a>Jason LamRemote File Include spoof!?