Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Diaries by Keyword Diaries by Keyword

Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

RASPBERRY PI

2017-08-03Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC

RASPBERRY

2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC

PI

2020-03-31/a>Johannes UllrichKwampirs Targeted Attacks Involving Healthcare Sector
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-17/a>Didier Stevenscurl and SSPI
2020-01-16/a>Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2019-12-29/a>Guy BruneauELK Dashboard for Pihole Logs
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-08-28/a>Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-05-16/a>Xavier MertensThe Risk of Authenticated Vulnerability Scans
2019-03-15/a>Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-02-26/a>Russ McReeAd Blocking With Pi Hole
2019-01-21/a>Didier StevensSuspicious GET Request: Do You Know What This Is?
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-07-21/a>Didier StevensBTC pickpockets are back
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-09-05/a>Adrien de BeaupreStruts vulnerability patch released by apache, patch now
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-05-10/a>Johannes UllrichRead This If You Are Using a Script to Pull Data From This Site
2017-05-08/a>Renato MarinhoExploring a P2P Transient Botnet - From Discovery to Enumeration
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-07/a>Xavier MertensUsing Security Tools to Compromize a Network
2016-08-22/a>Russ McReeRed Team Tools Updates: hashcat and SpiderFoot
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2014-05-28/a>Rob VandenBrinkAssessing SOAP APIs with Burp
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-10/a>Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-20/a>Rob VandenBrinkYou Can Run, but You Can't Hide (SSH and other open services)
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-12/a>Basil Alawi S.TaherAcquiring Memory Images with Dumpit
2013-12-01/a>Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-16/a>Guy BruneauVMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2011-12-07/a>Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-08-13/a>Rick WannerMoonSols Dumpit released...for free!
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-06-09/a>Richard PorterOne Browser to Rule them All?
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2010-12-25/a>Manuel Humberto Santander PelaezAn interesting vulnerability playground to learn application vulnerabilities
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-11-18/a>Chris CarboniAll of your pages are belonging to us
2010-07-21/a>Adrien de BeaupreUpdate on .LNK vulnerability
2010-07-08/a>Kyle HaugsnessPirate Bay account database compromised
2010-06-29/a>Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-03-30/a>Pedro BuenoSharing the Tools
2010-02-10/a>Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-01-25/a>William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2009-08-21/a>Rick WannerInteresting malware...affecting the Delphi Compiler?
2009-03-10/a>Swa Frantzenconspiracy fodder: pifts.exe
2008-10-01/a>Rick WannerHandler Mailbag
2008-07-14/a>Daniel WesemannObfuscated JavaScript Redux
2008-06-18/a>Marcus SachsOlympics Part II