Date Author Title

WINDOWS PROCESS LIST

2019-06-27Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell

WINDOWS

2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-02-19/a>Didier Stevens"Unsupported 16-bit Application" or HTML?
2023-02-09/a>Xavier MertensA Backdoor with Smart Screenshot Capability
2022-11-05/a>Guy BruneauWindows Malware with VHD Extension
2022-06-26/a>Didier StevensMy Paste Command
2022-06-24/a>Xavier MertensPython (ab)using The Windows GUI
2022-04-28/a>Johannes UllrichA Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-14/a>Johannes UllrichAn Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-06/a>Brad DuncanWindows MetaStealer Malware
2022-02-25/a>Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-07-21/a>Johannes Ullrich"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-19/a>Rick WannerNew Windows Print Spooler Vulnerability - CVE-2021-34481
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2020-09-30/a>Johannes UllrichScans for FPURL.xml: Reconnaissance or Not?
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-09-01/a>Johannes UllrichExposed Windows Domain Controllers Used in CLDAP DDoS Attacks
2020-08-25/a>Xavier MertensKeep An Eye on LOLBins
2020-06-24/a>Jan KoprivaUsing Shell Links as zero-touch downloaders and to initiate network connections
2020-03-30/a>Jan KoprivaCrashing explorer.exe with(out) a click
2020-03-23/a>Didier StevensWindows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-16/a>Jan KoprivaDesktop.ini as a post-exploitation tool
2020-02-18/a>Jan KoprivaDiscovering contents of folders in Windows without permissions
2020-02-17/a>Didier Stevenscurl and SSPI
2020-02-15/a>Didier Stevensbsdtar on Windows 10
2020-01-09/a>Kevin ShorttWindows 7 - End of Life
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-22/a>Johannes UllrichAn Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-01-14/a>Rob VandenBrinkStill Running Windows 7? Time to think about that upgrade project!
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-19/a>Xavier MertensMicrosoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-05-07/a>Xavier MertensAdding Persistence Via Scheduled Tasks
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-01-18/a>Rob VandenBrinkMaking Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-12/a>Mark BaggettSystem Resource Utilization Monitor
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-02/a>Tom WebbWindows 10 Anniversary Update Available
2016-07-12/a>Xavier MertensHunting for Malicious Files with MISP + OSSEC
2016-05-22/a>Pasquale StirparoThe strange case of WinZip MRU Registry key
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-02-18/a>Xavier MertensHunting for Executable Code in Windows Environments
2016-01-31/a>Guy BruneauWindows 10 and System Protection for DATA Default is OFF
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-07-05/a>Guy BruneauJava Support ends for Windows XP
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2014-04-04/a>Rob VandenBrinkWindows 8.1 Released
2014-03-24/a>Johannes UllrichNew Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-04/a>Daniel WesemannXPired!
2014-01-10/a>Basil Alawi S.TaherWindows Autorun-3
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2013-10-30/a>Russ McReeSIR v15: Five good reasons to leave Windows XP behind
2013-03-19/a>Johannes UllrichWindows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2012-10-24/a>Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-07-19/a>Mark BaggettDiagnosing Malware with Resource Monitor
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-06/a>Jim ClausingTool updates and Win 8
2012-04-10/a>Swa FrantzenWindows Vista RIP
2011-12-21/a>Johannes UllrichNew Vulnerability in Windows 7 64 bit
2011-07-09/a>Chris MohanSafer Windows Incident Response
2011-06-30/a>Rob VandenBrinkUpdate for RSA Authentication Manager
2011-06-01/a>Johannes UllrichEnabling Privacy Enhanced Addresses for IPv6
2011-03-27/a>Guy BruneauStrange Shockwave File with Surprising Attachments
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-02-24/a>Johannes UllrichWindows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>Johannes UllrichWindows 7 Service Pack 1 out
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2011-02-10/a>Chris MohanBefriending Windows Security Log Events
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-04/a>Johannes UllrichMicrosoft Advisory: Vulnerability in Graphics Rendering Engine
2010-11-24/a>Bojan ZdrnjaPrivilege escalation 0-day in almost all Windows versions
2010-08-02/a>Manuel Humberto Santander PelaezSecuring Windows Internet Kiosk
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-02-11/a>Deborah HaleThe Mysterious Blue Screen
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-24/a>Marcus SachsWindows 7 - How is it doing?
2009-09-08/a>Guy BruneauVista/2008/Windows 7 SMB2 BSOD 0Day
2009-08-26/a>Johannes UllrichWSUS 3.0 SP2 released
2009-07-16/a>Guy BruneauChanges in Windows Security Center
2009-07-02/a>Daniel WesemannTime to update updating on PCs for 3rd party apps
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-01-31/a>Swa FrantzenWindows 7 - not so secure ?
2008-08-15/a>Jim ClausingOMFW 2008 reflections
2008-06-12/a>Bojan ZdrnjaSafari on Windows - not looking good
2008-05-17/a>Lorna HutchesonXP SP3 Issues
2008-05-06/a>John BambenekWindows XP Service Pack 3 Released
2008-05-01/a>Adrien de BeaupreWindows XP SteadyState
2008-04-29/a>Bojan ZdrnjaWindows Service Pack blocker tool
2008-04-16/a>William StearnsWindows XP Service Pack 3 - unofficial schedule: Apr 21-28
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability

PROCESS

2024-10-03/a>Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-07-25/a>Xavier MertensXWorm Hidden With Process Hollowing
2023-11-09/a>Xavier MertensVisual Examples of Code Injection
2023-08-26/a>Xavier MertensmacOS: Who?s Behind This Network Connection?
2023-05-24/a>Jesse La GrewMore Data Enrichment for Cowrie Logs
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-03-15/a>Xavier MertensClean Binaries with Suspicious Behaviour
2021-05-30/a>Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-03-04/a>Xavier MertensFrom VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-01-17/a>Didier StevensNew Release of Sysmon Adding Detection for Process Tampering
2020-02-16/a>Guy BruneauSOAR or not to SOAR?
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2018-09-20/a>Xavier MertensHunting for Suspicious Processes with OSSEC
2018-07-03/a>Didier StevensProgress indication for scripts on Windows
2015-07-17/a>Didier StevensProcess Explorer and VirusTotal
2014-04-27/a>Tony CarothersThe Dreaded "D" Word of IT
2014-02-27/a>Richard PorterDDoS and BCP 38
2014-02-10/a>Rob VandenBrinkA Tale of Two Admins (and no Change Control)
2014-02-07/a>Rob VandenBrinkHello Virustotal? It's Microsoft Calling.
2013-02-06/a>Adam SwangerSysinternals in particular Process Explorer update https://blogs.technet.com/b/sysinternals/?Redirected=true
2012-01-13/a>Guy BruneauSysinternals Updates - http://blogs.technet.com/b/sysinternals/archive/2012/01/13/updates-autoruns-v11-21-coreinfo-v3-03-portmon-v-3-03-process-explorer-v15-12-mark-s-blog-and-mark-at-rsa-2012.aspx
2011-12-19/a>Guy BruneauProcess Explorer Update 15.11 with bugfixes - http://technet.microsoft.com/en-us/sysinternals/bb896653
2010-01-23/a>Lorna HutchesonThe necessary evils: Policies, Processes and Procedures
2009-10-22/a>Adrien de BeaupreCyber Security Awareness Month - Day 22 port 502 TCP - Modbus
2009-09-19/a>Rick WannerSysinternals Tools Updates
2009-08-30/a>Tony CarothersHow do I recover from.....?

LIST

2023-07-26/a>Xavier MertensSuspicious IP Addresses Avoided by Malware Samples
2023-05-26/a>Xavier MertensUsing DFIR Techniques To Recover From Infrastructure Outages
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2020-08-18/a>Rick WannerISC Blocked
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2019-09-19/a>Xavier MertensBlocklisting or Whitelisting in the Right Way
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2018-12-26/a>Didier StevensBitcoin "Blocklists"
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-05-23/a>Remco VerhoefTrack naughty and nice binaries with Google Santa
2018-02-25/a>Guy BruneauBlackhole Advertising Sites with Pi-hole
2017-04-05/a>Xavier MertensWhitelists: The Holy Grail of Attackers
2015-09-08/a>Lenny ZeltserA Close Look at PayPal Overpayment Scams That Target Craigslist Sellers
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2015-02-23/a>Richard PorterSubscribing to the DShield Top 20 on a Palo Alto Networks Firewall
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-08-17/a>Rick WannerPart 1: Is your home network unwittingly contributing to NTP DDOS attacks?
2013-12-23/a>Rob VandenBrinkHow-To's for the Holidays - Java Whitelisting using AD Group Policy
2013-10-16/a>Adrien de BeaupreAccess denied and blockliss
2013-09-03/a>Rob VandenBrinkIs "Reputation Backscatter" a Thing?
2013-04-30/a>Russ McReeApache binary backdoor adds malicious redirect to Blackhole
2013-04-23/a>Russ McReeMicrosoft's Security Intelligence Report (SIRv14) released
2012-09-01/a>Russ McReeBlackhole targeting Java vulnerability via fake Microsoft Services Agreement email phish
2012-06-26/a>Daniel WesemannRun, Forest! (Update)
2012-04-30/a>Rob VandenBrinkPatch for Oracle TNS Listener issue released !
2012-04-25/a>Daniel WesemannBlacole's shell code
2012-04-25/a>Daniel WesemannBlacole's obfuscated JavaScript
2011-12-06/a>Pedro BuenoThe RedRet connection...
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2010-08-13/a>Guy BruneauShadowserver Binary Whitelisting Service
2010-02-15/a>Johannes UllrichNew ISC Tool: Whitelist Hash Database
2009-10-16/a>Adrien de BeaupreCyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener
2009-09-07/a>Jim ClausingSeclists.org is finally back
2009-06-11/a>Rick WannerMIR-ROR Motile Incident Response - Respond Objectively Remediate
2009-05-27/a>donald smithHost file black lists
2009-02-03/a>Swa FrantzenOn the importance of patching fast
2008-05-28/a>Johannes UllrichReminder: Proper use of DShield data
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2006-12-18/a>Toby KohlenbergORDB Shutting down