Date Author Title

OBFUSCATED SQL INJECTION CAST ATTACK

2010-08-15Manuel Humberto Santander PelaezObfuscated SQL Injection attacks

OBFUSCATED

2022-05-09/a>Xavier MertensOctopus Backdoor is Back with a New Embedded Obfuscated Bat File
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks

SQL

2023-08-25/a>Xavier MertensPython Malware Using Postgresql for C2 Communications
2023-08-10/a>Bojan ZdrnjaSome things never change ? such as SQL Authentication ?encryption?
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2020-07-30/a>Johannes UllrichPython Developers: Prepare!!!
2017-08-07/a>Xavier MertensIncrease of phpMyAdmin scans
2017-08-02/a>Bojan ZdrnjaAttacking NoSQL applications (part 2)
2017-04-26/a>Johannes UllrichIf there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again)
2016-12-06/a>Bojan ZdrnjaAttacking NoSQL applications
2016-08-11/a>Pasquale StirparoLooking for the insider: Forensic Artifacts on iOS Messaging App
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-04-27/a>Tom WebbKippos Cousin Cowrie
2016-02-15/a>Bojan ZdrnjaExploiting (pretty) blind SQL injections
2013-10-19/a>Johannes UllrichYet Another WHMCS SQL Injection Exploit
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-04-04/a>Johannes UllrichPostgresql Patches Critical Vulnerability
2013-03-03/a>Richard PorterUptick in MSSQL Activity
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2012-12-02/a>Guy BruneauZero Day MySQL Buffer Overflow
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-09-21/a>Guy BruneauStoring your Collection of Malware Samples with Malwarehouse
2012-07-31/a>Daniel WesemannSQL injection, lilupophilupop-style
2012-06-11/a>Johannes UllrichExploit Available for Trivial MySQL Password Bypass
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-06-06/a>Johannes UllrichThe Havij SQL Injection Tool
2011-04-19/a>Bojan ZdrnjaSQL injection: why can’t we learn?
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2010-12-02/a>Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-05-21/a>Rick WannerMySQL 5.1.47 is now available - http://www.mysql.com/downloads/mysql/
2010-05-16/a>Rick WannerUpcoming MySQL patch fixes several critical vulnerabilites
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-05-19/a>Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-09/a>Patrick NolanShared SQL Injection Lessons Learned blog item
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-02-11/a>Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2008-12-23/a>Patrick NolanMS ACK's Vulnerability in SQL Server which Could Allow Remote Code Execution
2008-12-15/a>Toby KohlenbergNew MS SQL Server vulnerability
2008-12-12/a>Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-01/a>Jason LamInput filtering and escaping in SQL injection mitigation
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-09-29/a>Daniel WesemannASPROX mutant
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-23/a>Mark HofmanSQL injections - an update
2008-08-08/a>Mark HofmanMore SQL Injections - very active right now
2008-07-24/a>Bojan ZdrnjaWhat's brewing in Danmec's pot?
2008-06-30/a>Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-24/a>Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23/a>donald smithPreventing SQL injection
2008-06-13/a>Johannes UllrichSQL Injection: More of the same
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2008-04-16/a>Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-03-14/a>Kevin Liston2117966.net-- mass iframe injection
2008-01-09/a>Bojan ZdrnjaMass exploits with SQL Injection
2007-02-24/a>Jason LamPrepared Statements and SQL injections

INJECTION

2023-11-09/a>Xavier MertensVisual Examples of Code Injection
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-02-10/a>Johannes UllrichZyxel Network Storage Devices Hunted By Mirai Variant
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-07-06/a>Xavier MertensPython DLL Injection Check
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-04-29/a>Xavier MertensFrom Python to .Net
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-07-30/a>Johannes UllrichPython Developers: Prepare!!!
2018-09-28/a>Xavier MertensMore Excel DDE Code Injection
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2017-05-05/a>Xavier MertensHTTP Headers... the Achilles' heel of many applications
2016-02-15/a>Bojan ZdrnjaExploiting (pretty) blind SQL injections
2013-10-19/a>Johannes UllrichYet Another WHMCS SQL Injection Exploit
2013-07-16/a>Johannes UllrichWhy don't we see more examples of web app attacks via POST?
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2012-07-31/a>Daniel WesemannSQL injection, lilupophilupop-style
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-06-06/a>Johannes UllrichThe Havij SQL Injection Tool
2011-04-19/a>Bojan ZdrnjaSQL injection: why can’t we learn?
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2010-12-02/a>Kevin JohnsonSQL Injection: Wordpress 3.0.2 released
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-06-09/a>Deborah HaleMass Infection of IIS/ASP Sites
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-05-19/a>Bojan ZdrnjaAdvanced blind SQL injection (with Oracle examples)
2009-05-09/a>Patrick NolanShared SQL Injection Lessons Learned blog item
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-02-11/a>Robert DanfordProFTPd SQL Authentication Vulnerability exploit activity
2008-12-12/a>Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-01/a>Jason LamInput filtering and escaping in SQL injection mitigation
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-09-29/a>Daniel WesemannASPROX mutant
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-08-23/a>Mark HofmanSQL injections - an update
2008-08-08/a>Mark HofmanMore SQL Injections - very active right now
2008-07-24/a>Bojan ZdrnjaWhat's brewing in Danmec's pot?
2008-06-30/a>Marcus SachsMore SQL Injection with Fast Flux hosting
2008-06-24/a>Jason LamSQL Injection mitigation in ASP
2008-06-24/a>Jason LamMicrosoft SQL Injection Prevention Strategy
2008-06-23/a>donald smithPreventing SQL injection
2008-06-13/a>Johannes UllrichSQL Injection: More of the same
2008-05-20/a>Raul SilesList of malicious domains inserted through SQL injection
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2008-04-16/a>Bojan ZdrnjaThe 10.000 web sites infection mystery solved
2008-03-14/a>Kevin Liston2117966.net-- mass iframe injection
2008-01-09/a>Bojan ZdrnjaMass exploits with SQL Injection
2007-02-24/a>Jason LamPrepared Statements and SQL injections

CAST

2021-09-07/a>Johannes UllrichWhy I Gave Up on IPv6. And no, it is not because of security issues.
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2014-06-01/a>Johannes UllrichWhen was the last time you checked your Comcast cable modem settings?
2014-01-13/a>Johannes UllrichSpecial Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650
2013-09-05/a>Rob VandenBrinkWhat's Next for IPS?
2013-02-14/a>Adam SwangerISC Monthly Threat Update - February 2013 http://isc.sans.edu/podcastdetail.html?id=3121
2013-01-10/a>Adam SwangerISC Monthly Threat Update New Format
2013-01-07/a>Adam SwangerPlease consider participating in our 2013 ISC StormCast survey at http://www.surveymonkey.com/s/stormcast
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2011-10-12/a>Adam SwangerWe are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved.
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-06-18/a>Johannes UllrichPlease take a second and rate the daily podcast (Stormcast): http://www.surveymonkey.com/s/stormcast
2010-02-02/a>Johannes UllrichNew IPv6 Screencast Videos: http://isc.sans.org/ipv6videos (Today: blocking and detecting IPv6 in Linux)
2009-12-07/a>Rob VandenBrinkLayer 2 Network Protections – reloaded!
2009-04-17/a>Joel EslerInternet Storm Center Podcast Episode Number Fourteen
2009-02-19/a>Joel EslerInternet Storm Center Podcast Episode Number Thirteen
2009-02-09/a>Johannes UllrichNew ISC Feature: Micro Podcasts
2008-12-12/a>Joel EslerInternet Storm Center Podcast Episode Twelve
2008-10-22/a>Joel EslerPodcast Episode Eleven Posted
2008-08-26/a>Joel EslerPodcast Episode X Record Notice
2008-07-08/a>Joel EslerPodcast Episode Eight Record Notice
2008-06-24/a>Joel EslerPodcast Episode Seven Record Notice
2008-06-13/a>Joel EslerPodcast Episode Six
2008-05-28/a>Joel EslerPodcast Episode Five has been released
2008-05-20/a>Joel EslerPodcast Episode Four has been released
2008-05-01/a>Joel EslerISC Podcast Episode Number 3
2008-04-25/a>Joel EslerHey, where is the podcast?
2008-04-09/a>Joel EslerISC Podcast Episode Number 2
2008-03-27/a>Johannes UllrichInternet Storm Center Podcast

ATTACK

2024-01-08/a>Jesse La GrewWhat is that User Agent?
2022-08-10/a>Johannes UllrichAnd Here They Come Again: DNS Reflection Attacks
2022-03-26/a>Guy BruneauIs buying Cyber Insurance a Must Now?
2022-02-03/a>Johannes UllrichKeeping Track of Your Attack Surface for Cheap
2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2019-08-25/a>Guy BruneauAre there any Advantages of Buying Cyber Security Insurance?
2019-07-20/a>Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2016-11-02/a>Rob VandenBrinkWhat Does a Pentest Look Like?
2016-06-03/a>Tom ListonMySQL is YourSQL
2015-03-18/a>Daniel WesemannPass the hash!
2015-02-19/a>Daniel WesemannDNS-based DDoS
2014-02-26/a>Russ McReeOngoing NTP Amplification Attacks
2014-02-17/a>Chris MohanNTP reflection attacks continue
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-08-19/a>Guy Bruneau Business Risks and Cyber Attacks
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2012-10-05/a>Richard PorterReports of a Distributed Injection Scan
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2011-12-01/a>Mark HofmanSQL Injection Attack happening ATM
2011-09-28/a>Richard PorterAll Along the ARP Tower!
2011-01-23/a>Richard PorterCrime is still Crime!
2010-12-23/a>Mark HofmanWhite house greeting cards
2010-08-16/a>Raul SilesDDOS: State of the Art
2010-08-15/a>Manuel Humberto Santander PelaezObfuscated SQL Injection attacks
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-03-15/a>Adrien de BeaupreSpamassassin Milter Plugin Remote Root Attack
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2009-11-11/a>Rob VandenBrinkLayer 2 Network Protections against Man in the Middle Attacks
2009-08-28/a>Adrien de BeaupreWPA with TKIP done
2009-06-04/a>Raul SilesTargeted e-mail attacks asking to verify wire transfer details
2009-04-20/a>Jason LamDigital Content on TV
2009-04-02/a>Bojan ZdrnjaJavaScript insertion and log deletion attack tools
2009-03-20/a>donald smithStealthier then a MBR rootkit, more powerful then ring 0 control, it’s the soon to be developed SMM root kit.
2009-02-25/a>Swa FrantzenTargeted link diversion attempts
2009-01-30/a>Mark HofmanRequest for info - Scan and webmail
2009-01-18/a>Maarten Van HorenbeeckTargeted social engineering
2008-12-03/a>Andre LudwigNew ISC Poll! Has your organization suffered a DDoS (Distributed Denial of Service) attack in the last year?
2008-07-09/a>Johannes UllrichUnpatched Word Vulnerability
2008-05-26/a>Marcus SachsPredictable Response
2008-03-27/a>Maarten Van HorenbeeckGuarding the guardians: a story of PGP key ring theft