SANS INVESTIGATIVE FORENSIC TOOLKIT |
2010-05-04 | Rick Wanner | SIFT review in the ISSA Toolsmith |
SANS |
2023-04-27/a> | Johannes Ullrich | SANS.edu Research Journal: Volume 3 |
2023-03-07/a> | Johannes Ullrich | Hackers Love This VSCode Extension: What You Can Do to Stay Safe |
2022-12-10/a> | Didier Stevens | Open Now: 2022 SANS Holiday Hack Challenge & KringleCon |
2022-06-15/a> | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-06-02/a> | Johannes Ullrich | Quick Answers in Incident Response: RECmd.exe |
2015-03-18/a> | Daniel Wesemann | New SANS memory forensics poster |
2014-06-30/a> | Johannes Ullrich | Should I setup a Honeypot? [SANSFIRE] |
2013-09-05/a> | Rob VandenBrink | What's Next for IPS? |
2013-06-17/a> | Daniel Wesemann | SANSFIRE 2013 |
2013-04-25/a> | Adam Swanger | SANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey |
2012-12-03/a> | John Bambenek | John McAfee Exposes His Location in Photo About His Being on Run |
2012-11-29/a> | Kevin Shortt | New Apple Security Update: APPLE-SA-2012-11-29-1 Apple TV 5.1.1 |
2012-11-28/a> | Mark Hofman | McAfee releases extraDAT for W32/Autorun.worm.aaeb-h |
2012-11-28/a> | Mark Hofman | New version of wireshark is available (1.8.4), some security fixes included. |
2012-11-27/a> | Chris Mohan | Can users' phish emails be a security admin's catch of the day? |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-20/a> | John Bambenek | Behind the Random NTP Bizarreness of Incorrect Year Being Set |
2012-11-20/a> | John Bambenek | Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/ |
2012-11-19/a> | John Bambenek | MoneyGram fined $100 million for aiding wire fraud - http://krebsonsecurity.com/2012/11/moneygram-fined-100-million-for-wire-fraud/ |
2012-11-19/a> | John Bambenek | New Poll: Top 5 Unresolved Security Problems of 2012 |
2012-11-17/a> | Manuel Humberto Santander Pelaez | New Sysinternal Updates: AdExplorer v1.44, Contig v1.7, Coreinfo v3.2, Procdump v5.1. See http://blogs.technet.com/b/sysinternals/archive/2012/11/16/updates-adexplorer-v1-44-contig-v1-7-coreinfo-v3-2-procdump-v5-1.aspx?Redirected=true |
2012-11-12/a> | John Bambenek | Request for info: Robocall Phishing Against Local/Regional Banks |
2012-11-09/a> | Mark Baggett | Remote Diagnostics with PSR |
2012-11-09/a> | Mark Baggett | Fresh batch of Microsoft patches next week |
2012-11-07/a> | Mark Baggett | Help eliminate unquoted path vulnerabilities |
2012-11-07/a> | Mark Baggett | Multiple 0-Days Reported! |
2012-11-07/a> | Mark Baggett | Cisco TACACS+ Authentication Bypass |
2012-11-05/a> | Johannes Ullrich | Reminder: Ongoing SMTP Brute Forcing Attacks |
2012-11-05/a> | Johannes Ullrich | Possible Fake-AV Ads from Doubleclick Servers |
2012-11-04/a> | Lorna Hutcheson | What's important on your network? |
2012-10-31/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 31 - Business Continuity and Disaster Recovery |
2012-10-30/a> | Johannes Ullrich | Hurricane Sandy Update |
2012-10-30/a> | Richard Porter | Splunk 5.0 SP-CAAAHB4 http://www.splunk.com/view/SP-CAAAHB4 |
2012-10-30/a> | Mark Hofman | Cyber Security Awareness Month - Day 30 - DSD 35 mitigating controls |
2012-10-28/a> | Tony Carothers | Firefox 16.02 Released |
2012-10-26/a> | Russ McRee | Cyber Security Awareness Month - Day 26 - Attackers use trusted domain to propagate Citadel Zeus variant |
2012-10-25/a> | Richard Porter | Cyber Security Awareness Month - Day 25 - Pro Audio & Video Packets on the Wire |
2012-10-24/a> | Russ McRee | Ongoing Windstream outage in the midwest - https://twitter.com/search?q=windstream |
2012-10-21/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 22: Connectors |
2012-10-21/a> | Lorna Hutcheson | Potential Phish for Regular Webmail Accounts |
2012-10-19/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 19: Standard log formats and CEE. |
2012-10-18/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 18 - Vendor Standards: The vSphere Hardening Guide |
2012-10-17/a> | Mark Hofman | Oracle Critical Patch Update October |
2012-10-17/a> | Mark Hofman | New Acrobat release (including reader) available. Version 11. Some security improvements more here -->http://blogs.adobe.com/adobereader/ |
2012-10-16/a> | Richard Porter | CyberAwareness Month - Day 15, Standards Body Soup (pt2), Same Soup Different Cook. |
2012-10-16/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 16: W3C and HTML |
2012-10-14/a> | Pedro Bueno | Cyber Security Awareness Month - Day 14 - Poor Man's File Analysis System - Part 1 |
2012-10-09/a> | Johannes Ullrich | Microsoft October 2012 Black Tuesday Update - Overview |
2012-10-07/a> | Tony Carothers | Cyber Security Awareness Month - Day 7 - Rollup Review of CSAM Week 1 |
2012-10-05/a> | Johannes Ullrich | Cyber Security Awareness Month - Day 5: Standards Body Soup, So many Flavors in the bowl. |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-10-05/a> | Richard Porter | VMWare Security Advisory: VMSA-2012-0014 - http://www.vmware.com/security/advisories/VMSA-2012-0014.html |
2012-10-04/a> | Mark Hofman | And the SHA-3 title goes to .....Keccak |
2012-10-02/a> | Russ McRee | Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines |
2012-10-01/a> | Johannes Ullrich | Cyber Security Awareness Month |
2012-09-28/a> | Joel Esler | Adobe certification revocation for October 4th |
2012-09-26/a> | Johannes Ullrich | Some Android phones can be reset to factory default by clicking on links |
2012-09-26/a> | Johannes Ullrich | More Java Woes |
2012-09-21/a> | Johannes Ullrich | iOS 6 Security Roundup |
2012-09-20/a> | Russ McRee | Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/ |
2012-09-20/a> | Russ McRee | Apple and Cisco Security Advisories 19 SEP 2012 |
2012-09-20/a> | Russ McRee | Financial sector advisory: attacks and threats against financial institutions |
2012-09-19/a> | Russ McRee | Script kiddie scavenging with Shellbot.S |
2012-09-17/a> | Rob VandenBrink | What's on your iPad? |
2012-09-14/a> | Lenny Zeltser | Scam Report - Fake Voice Mail Email Notification Redirects to Malicious Site |
2012-09-13/a> | Mark Baggett | More SSL trouble |
2012-09-13/a> | Mark Baggett | TCP Fuzzing with Scapy |
2012-09-13/a> | Mark Baggett | Microsoft disrupts traffic associated with the Nitol botnet |
2012-09-10/a> | Johannes Ullrich | Microsoft Patch Tuesday Pre-Release |
2012-09-10/a> | Johannes Ullrich | Godaddy DDoS Attack |
2012-09-10/a> | donald smith | Blue Toad publishing co compromise lead to UDID release. http://redtape.nbcnews.com/_news/2012/09/10/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week?lite |
2012-09-07/a> | Chris Mohan | Keeping an eye on those BYODs with DHCP |
2012-09-06/a> | Johannes Ullrich | SSL Requests sent to port 80 (request for help/input) |
2012-09-04/a> | Johannes Ullrich | Another round of "Spot the Exploit E-Mail" |
2012-09-02/a> | Lorna Hutcheson | Demonstrating the value of your Intrusion Detection Program and Analysts |
2012-09-01/a> | Russ McRee | Blackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish |
2012-08-31/a> | Russ McRee | Not so fast: Java 7 Update 7 critical vulnerability discovered in less than 24 hours |
2012-08-30/a> | Johannes Ullrich | Editorial: The Slumlord Approach to Network Security http://isc.sans.edu/j/editorial |
2012-08-29/a> | Johannes Ullrich | "Data" URLs used for in-URL phishing |
2012-08-27/a> | Johannes Ullrich | The Good, Bad and Ugly about Assigning IPv6 Addresses |
2012-08-27/a> | Johannes Ullrich | Malware Spam harvesting Facebook Information |
2012-08-26/a> | Lorna Hutcheson | Who ya gonna contact? |
2012-08-22/a> | Adrien de Beaupre | Apple Remote Desktop update fixes no encryption issue |
2012-08-22/a> | Adrien de Beaupre | Phishing/spam via SMS |
2012-08-21/a> | Adrien de Beaupre | YYABCAFU - Yes Yet Another Bleeping Critical Adobe Flash Update |
2012-08-21/a> | Adrien de Beaupre | RuggedCom fails key management 101 on Rugged Operating System (ROS) |
2012-08-20/a> | Manuel Humberto Santander Pelaez | Do we need test procedures in our companies before implementing Antivirus signatures? |
2012-08-19/a> | Manuel Humberto Santander Pelaez | Authentication Issues between entities during protocol message exchange in SCADA Systems |
2012-08-14/a> | Rick Wanner | Backtrack 5 r3 released - http://www.backtrack-linux.org/downloads/ |
2012-08-12/a> | Tony Carothers | Layers of the Defense-in-Depth Onion |
2012-08-12/a> | Tony Carothers | Oracle Security Alert for CVE-2012-3132 |
2012-08-09/a> | Mark Hofman | Zeus/Citadel variant causing issues in the Netherlands |
2012-08-09/a> | Mark Hofman | SQL Injection Lilupophilupop style, Part 2 |
2012-08-08/a> | Adrien de Beaupre | snort updated to 2.9.3.1 Changelog: http://www.snort.org/downloads/1837 |
2012-08-07/a> | Adrien de Beaupre | Who protects small business? |
2012-08-04/a> | Kevin Liston | Vendors: More Patch-Release Options Please |
2012-07-27/a> | Daniel Wesemann | Cuckoo 0.4 is out - cool new features for malware analysis http://www.cuckoosandbox.org/ |
2012-07-24/a> | Richard Porter | Report of spike in DNS Queries gd21.net |
2012-07-24/a> | Richard Porter | Wireshark 1.8.1 Released http://www.wireshark.org/ |
2012-07-20/a> | Mark Baggett | Syria Internet connection cut? |
2012-07-19/a> | Mark Baggett | Diagnosing Malware with Resource Monitor |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-07-16/a> | Richard Porter | Sysinternals Update @ http://blogs.technet.com/b/sysinternals/archive/2012/07/16/updates-handle-v3-5-process-explorer-v15-22-process-monitor-v3-03-rammap-v1-21-zoomit-v4-3.aspx |
2012-07-13/a> | Richard Porter | Yesterday (not as on the ball as Rob) at SANSFire |
2012-07-13/a> | Russ McRee | 2 for 1: SANSFIRE & MSRA presentations |
2012-07-13/a> | Russ McRee | VMWare Security Advisory 12 JUL 2012 |
2012-07-13/a> | Russ McRee | Yahoo service SQL injection vuln leads to account exposure |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctms |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Recording Server - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctrs |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Immersive Endpoint Devices - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-cts |
2012-07-12/a> | Rick Wanner | Cisco Security Advisory: Multiple Vulnerabilities in Cisco TelePresence Manager - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120711-ctsman |
2012-07-12/a> | Rob VandenBrink | Today at SANSFIRE - Dude Your Car is PWND ! |
2012-07-11/a> | Rick Wanner | Excellent Security Education Resources |
2012-07-10/a> | Rob VandenBrink | Today at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet |
2012-07-09/a> | Johannes Ullrich | The FBI will turn off the Internet on Monday (or not) |
2012-07-09/a> | Manuel Humberto Santander Pelaez | Internet Storm Center panel tonight at SANSFIRE 2012! |
2012-07-05/a> | Adrien de Beaupre | New OS X trojan backdoor MaControl variant reported |
2012-07-05/a> | Adrien de Beaupre | Microsoft advanced notification for July 2012 patch Tuesday |
2012-07-02/a> | Joel Esler | A rough guide to keeping your website up |
2012-07-02/a> | Joel Esler | Linux & Java leap second bug |
2012-06-29/a> | Jim Clausing | Updated SysInternals tools - Autoruns, Process Explorer, Process Monitor, PSKill -- http://blogs.technet.com/b/sysinternals/archive/2012/06/28/updates-autoruns-v11-32-process-explorer-v15-21-process-monitor-v3-02-pskill-v1-15-rammap-v1-2.aspx |
2012-06-28/a> | Chris Mohan | Massive spike in BGP traffic - Possible BGP poisoning? |
2012-06-21/a> | Russ McRee | Analysis of drive-by attack sample set |
2012-06-21/a> | Russ McRee | Wireshark 1.8.0 released 21 JUN 2012 http://www.wireshark.org/download.html |
2012-06-19/a> | Daniel Wesemann | Vulnerabilityqueerprocessbrittleness |
2011-06-15/a> | Johannes Ullrich | Latest issue of "Ouch!" is out http://www.securingthehuman.org/resources/newsletters/ouch |
2010-06-07/a> | Manuel Humberto Santander Pelaez | Internet Storm Center panel tonight at SANSFIRE |
2010-05-22/a> | Rick Wanner | SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge |
2010-05-21/a> | Rick Wanner | 2010 Digital Forensics and Incident Response Summit |
2010-05-07/a> | Rob VandenBrink | Security Awareness – Many Audiences, Many Messages (Part 2) |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
2009-09-15/a> | Johannes Ullrich | SANS releases new Cyber Security Risk Report |
2009-06-20/a> | Mark Hofman | G'day from Sansfire2009 |
2009-06-14/a> | Guy Bruneau | SANSFIRE 2009 Starts Tomorrow |
INVESTIGATIVE |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
FORENSIC |
2024-05-08/a> | Xavier Mertens | Analyzing Synology Disks on Linux |
2024-03-29/a> | Xavier Mertens | Quick Forensics Analysis of Apache logs |
2023-01-26/a> | Tom Webb | Live Linux IR with UAC |
2023-01-02/a> | Xavier Mertens | NetworkMiner 2.8 Released |
2021-12-22/a> | Brad Duncan | December 2021 Forensic Contest: Answers and Analysis |
2021-12-08/a> | Brad Duncan | December 2021 Forensic Challenge |
2021-11-04/a> | Tom Webb | Xmount for Disk Images |
2021-10-22/a> | Brad Duncan | October 2021 Contest: Forensic Challenge |
2021-06-30/a> | Brad Duncan | June 2021 Forensic Contest: Answers and Analysis |
2021-06-18/a> | Daniel Wesemann | Network Forensics on Azure VMs (Part #2) |
2021-06-17/a> | Daniel Wesemann | Network Forensics on Azure VMs (Part #1) |
2021-05-19/a> | Brad Duncan | May 2021 Forensic Contest: Answers and Analysis |
2021-05-05/a> | Brad Duncan | May 2021 Forensic Contest |
2021-04-01/a> | Brad Duncan | April 2021 Forensic Quiz |
2021-02-25/a> | Daniel Wesemann | Forensicating Azure VMs |
2020-12-16/a> | Daniel Wesemann | DNS Logs in Public Clouds |
2019-10-25/a> | Rob VandenBrink | More on DNS Archeology (with PowerShell) |
2019-08-21/a> | Russ McRee | KAPE: Kroll Artifact Parser and Extractor |
2018-01-26/a> | Xavier Mertens | Investigating Microsoft BITS Activity |
2017-10-02/a> | Xavier Mertens | Investigating Security Incidents with Passive DNS |
2017-09-28/a> | Xavier Mertens | The easy way to analyze huge amounts of PCAP data |
2017-09-24/a> | Jim Clausing | Forensic use of mount --bind |
2017-09-19/a> | Jim Clausing | New tool: mac-robber.py |
2017-07-09/a> | Russ McRee | Adversary hunting with SOF-ELK |
2017-01-12/a> | Mark Baggett | System Resource Utilization Monitor |
2016-10-31/a> | Russ McRee | SEC505 DFIR capture script: snapshot.ps1 |
2016-08-11/a> | Pasquale Stirparo | Looking for the insider: Forensic Artifacts on iOS Messaging App |
2016-06-01/a> | Xavier Mertens | Docker Containers Logging |
2016-05-22/a> | Pasquale Stirparo | The strange case of WinZip MRU Registry key |
2016-03-28/a> | Xavier Mertens | Improving Bash Forensics Capabilities |
2016-03-11/a> | Jim Clausing | Forensicating Docker, Part 1 |
2016-02-18/a> | Xavier Mertens | Hunting for Executable Code in Windows Environments |
2016-01-06/a> | Russ McRee | toolsmith #112: Red vs Blue - PowerSploit vs PowerForensics |
2015-04-24/a> | Basil Alawi S.Taher | Fileless Malware |
2015-04-17/a> | Didier Stevens | Memory Forensics Of Network Devices |
2015-03-18/a> | Daniel Wesemann | New SANS memory forensics poster |
2015-02-03/a> | Johannes Ullrich | Another Network Forensic Tool for the Toolbox - Dshell |
2014-08-10/a> | Basil Alawi S.Taher | Incident Response with Triage-ir |
2014-06-22/a> | Russ McRee | OfficeMalScanner helps identify the source of a compromise |
2014-06-03/a> | Basil Alawi S.Taher | An Introduction to RSA Netwitness Investigator |
2014-05-18/a> | Russ McRee | sed and awk will always rock |
2014-03-11/a> | Basil Alawi S.Taher | Introduction to Memory Analysis with Mandiant Redline |
2014-03-07/a> | Tom Webb | Linux Memory Dump with Rekall |
2014-02-09/a> | Basil Alawi S.Taher | Mandiant Highlighter 2 |
2014-01-10/a> | Basil Alawi S.Taher | Windows Autorun-3 |
2013-12-12/a> | Basil Alawi S.Taher | Acquiring Memory Images with Dumpit |
2013-11-21/a> | Mark Baggett | "In the end it is all PEEKS and POKES." |
2013-11-20/a> | Mark Baggett | Searching live memory on a running machine with winpmem |
2013-11-19/a> | Mark Baggett | Winpmem - Mild mannered memory aquisition tool?? |
2013-08-26/a> | Alex Stanford | Stop, Drop and File Carve |
2013-08-14/a> | Johannes Ullrich | Imaging LUKS Encrypted Drives |
2013-07-12/a> | Rob VandenBrink | Hmm - where did I save those files? |
2013-05-23/a> | Adrien de Beaupre | MoVP II |
2013-04-25/a> | Adam Swanger | SANS 2013 Forensics Survey - https://www.surveymonkey.com/s/2013SANSForensicsSurvey |
2012-11-02/a> | Daniel Wesemann | The shortcomings of anti-virus software |
2012-09-14/a> | Lenny Zeltser | Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan |
2012-06-04/a> | Lenny Zeltser | Decoding Common XOR Obfuscation in Malicious Code |
2011-09-29/a> | Daniel Wesemann | The SSD dilemma |
2011-08-05/a> | Johannes Ullrich | Forensics: SIFT Kit 2.1 now available for download http://computer-forensics.sans.org/community/downloads |
2011-03-01/a> | Daniel Wesemann | AV software and "sharing samples" |
2010-11-17/a> | Guy Bruneau | Reference on Open Source Digital Forensics |
2010-11-12/a> | Guy Bruneau | Honeynet Forensic Challenge - Analyzing Malicious Portable Destructive Files |
2010-07-13/a> | Jim Clausing | Forensic challenge results |
2010-06-04/a> | Rick Wanner | New Honeynet Project Forensic Challenge |
2010-05-22/a> | Rick Wanner | SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge |
2010-05-21/a> | Rick Wanner | 2010 Digital Forensics and Incident Response Summit |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
2010-04-30/a> | Kevin Liston | The Importance of Small Files |
2010-04-11/a> | Marcus Sachs | Network and process forensics toolset |
2010-03-28/a> | Rick Wanner | Honeynet Project: 2010 Forensic Challenge #3 |
2010-03-26/a> | Daniel Wesemann | SIFT2.0 SANS Investigative Forensics Toolkit released |
2010-01-19/a> | Jim Clausing | Forensic challenges |
2009-12-14/a> | Adrien de Beaupre | Anti-forensics, COFEE vs. DECAF |
2009-11-25/a> | Jim Clausing | Updates to my GREM Gold scripts and a new script |
2009-08-18/a> | Daniel Wesemann | Forensics: Mounting partitions from full-disk 'dd' images |
2009-08-13/a> | Jim Clausing | New and updated cheat sheets |
2009-07-02/a> | Daniel Wesemann | Getting the EXE out of the RTF |
2009-02-02/a> | Stephen Hall | How do you audit your production code? |
2009-01-02/a> | Rick Wanner | Tools on my Christmas list. |
2008-11-17/a> | Marcus Sachs | New Tool: NetWitness Investigator |
2008-08-17/a> | Kevin Liston | Volatility 1.3 Released |
2008-08-15/a> | Jim Clausing | OMFW 2008 reflections |
TOOLKIT |
2010-05-04/a> | Rick Wanner | SIFT review in the ISSA Toolsmith |
2009-11-02/a> | Rob VandenBrink | Microsoft releases v1.02 of Enhanced Mitigation Evaluation Toolkit (EMET) |