Internet Storm Center
Sign In
Sign Up
SANS Network Security: Las Vegas Sept 4-9.
Handler on Duty:
Xavier Mertens
Threat Level:
green
Date
Author
Title
WINDOWS EVENT LOGS
2016-08-29
Russ McRee
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
WINDOWS
2023-06-29/a>
Brad Duncan
GuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-03-22/a>
Didier Stevens
Windows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-02-19/a>
Didier Stevens
"Unsupported 16-bit Application" or HTML?
2023-02-09/a>
Xavier Mertens
A Backdoor with Smart Screenshot Capability
2022-11-05/a>
Guy Bruneau
Windows Malware with VHD Extension
2022-06-26/a>
Didier Stevens
My Paste Command
2022-06-24/a>
Xavier Mertens
Python (ab)using The Windows GUI
2022-04-28/a>
Johannes Ullrich
A Day of SMB: What does our SMB/RPC Honeypot see? CVE-2022-26809
2022-04-14/a>
Johannes Ullrich
An Update on CVE-2022-26809 - MSRPC Vulnerabliity - PATCH NOW
2022-04-06/a>
Brad Duncan
Windows MetaStealer Malware
2022-02-25/a>
Didier Stevens
Windows, Fixed IPv4 Addresses and APIPA
2021-10-14/a>
Xavier Mertens
Port-Forwarding with Windows for the Win
2021-07-21/a>
Johannes Ullrich
"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
2021-07-19/a>
Rick Wanner
New Windows Print Spooler Vulnerability - CVE-2021-34481
2021-05-02/a>
Didier Stevens
PuTTY And FileZilla Use The Same Fingerprint Registry Keys
2020-09-30/a>
Johannes Ullrich
Scans for FPURL.xml: Reconnaissance or Not?
2020-09-02/a>
Xavier Mertens
Python and Risky Windows API Calls
2020-09-01/a>
Johannes Ullrich
Exposed Windows Domain Controllers Used in CLDAP DDoS Attacks
2020-08-25/a>
Xavier Mertens
Keep An Eye on LOLBins
2020-06-24/a>
Jan Kopriva
Using Shell Links as zero-touch downloaders and to initiate network connections
2020-03-30/a>
Jan Kopriva
Crashing explorer.exe with(out) a click
2020-03-23/a>
Didier Stevens
Windows Zeroday Actively Exploited: Type 1 Font Parsing Remote Code Execution Vulnerability
2020-03-16/a>
Jan Kopriva
Desktop.ini as a post-exploitation tool
2020-02-18/a>
Jan Kopriva
Discovering contents of folders in Windows without permissions
2020-02-17/a>
Didier Stevens
curl and SSPI
2020-02-15/a>
Didier Stevens
bsdtar on Windows 10
2020-01-09/a>
Kevin Shortt
Windows 7 - End of Life
2019-06-27/a>
Rob VandenBrink
Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-06/a>
Xavier Mertens
Keep an Eye on Your WMI Logs
2019-05-22/a>
Johannes Ullrich
An Update on the Microsoft Windows RDP "Bluekeep" Vulnerability (CVE-2019-0708) [now with pcaps]
2019-03-05/a>
Rob VandenBrink
Powershell, Active Directory and the Windows Host Firewall
2019-01-14/a>
Rob VandenBrink
Still Running Windows 7? Time to think about that upgrade project!
2018-12-19/a>
Xavier Mertens
Restricting PowerShell Capabilities with NetSh
2018-12-19/a>
Xavier Mertens
Microsoft OOB Patch for Internet Explorer: Scripting Engine Memory Corruption Vulnerability
2018-06-05/a>
Xavier Mertens
Malicious Post-Exploitation Batch File
2018-05-07/a>
Xavier Mertens
Adding Persistence Via Scheduled Tasks
2018-05-02/a>
Russ McRee
Windows Commands Reference - An InfoSec Must Have
2017-11-15/a>
Xavier Mertens
If you want something done right, do it yourself!
2017-11-11/a>
Xavier Mertens
Keep An Eye on your Root Certificates
2017-01-18/a>
Rob VandenBrink
Making Windows 10 a bit less "Creepy" - Common Privacy Settings
2017-01-12/a>
Mark Baggett
System Resource Utilization Monitor
2016-11-18/a>
Didier Stevens
VBA Shellcode and Windows 10
2016-08-29/a>
Russ McRee
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-08-02/a>
Tom Webb
Windows 10 Anniversary Update Available
2016-07-12/a>
Xavier Mertens
Hunting for Malicious Files with MISP + OSSEC
2016-05-22/a>
Pasquale Stirparo
The strange case of WinZip MRU Registry key
2016-05-18/a>
Russ McRee
Resources: Windows Auditing & Monitoring, Linux 2FA
2016-04-15/a>
Xavier Mertens
Windows Command Line Persistence?
2016-03-30/a>
Xavier Mertens
What to watch with your FIM?
2016-02-18/a>
Xavier Mertens
Hunting for Executable Code in Windows Environments
2016-01-31/a>
Guy Bruneau
Windows 10 and System Protection for DATA Default is OFF
2015-12-09/a>
Xavier Mertens
Enforcing USB Storage Policy with PowerShell
2015-08-12/a>
Rob VandenBrink
Windows Service Accounts - Why They're Evil and Why Pentesters Love them!
2014-08-15/a>
Tom Webb
AppLocker Event Logs with OSSEC 2.8
2014-07-05/a>
Guy Bruneau
Java Support ends for Windows XP
2014-04-06/a>
Basil Alawi S.Taher
"Power Worm" PowerShell based Malware
2014-04-04/a>
Rob VandenBrink
Windows 8.1 Released
2014-03-24/a>
Johannes Ullrich
New Microsoft Advisory: Unpatched Word Flaw used in Targeted Attacks
2014-03-04/a>
Daniel Wesemann
XPired!
2014-01-10/a>
Basil Alawi S.Taher
Windows Autorun-3
2014-01-04/a>
Tom Webb
Monitoring Windows Networks Using Syslog (Part One)
2013-10-30/a>
Russ McRee
SIR v15: Five good reasons to leave Windows XP behind
2013-03-19/a>
Johannes Ullrich
Windows 7 SP1 and Windows Server 2008 R2 SP1 Being "pushed" today
2013-02-28/a>
Daniel Wesemann
Parsing Windows Eventlogs in Powershell
2012-10-24/a>
Rob VandenBrink
Time to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-07-19/a>
Mark Baggett
Diagnosing Malware with Resource Monitor
2012-06-25/a>
Guy Bruneau
Issues with Windows Update Agent
2012-05-08/a>
Bojan Zdrnja
Windows Firewall Bypass Vulnerability and NetBIOS NS
2012-05-06/a>
Jim Clausing
Tool updates and Win 8
2012-04-10/a>
Swa Frantzen
Windows Vista RIP
2011-12-21/a>
Johannes Ullrich
New Vulnerability in Windows 7 64 bit
2011-07-09/a>
Chris Mohan
Safer Windows Incident Response
2011-06-30/a>
Rob VandenBrink
Update for RSA Authentication Manager
2011-06-01/a>
Johannes Ullrich
Enabling Privacy Enhanced Addresses for IPv6
2011-03-27/a>
Guy Bruneau
Strange Shockwave File with Surprising Attachments
2011-03-15/a>
Lenny Zeltser
Limiting Exploit Capabilities by Using Windows Integrity Levels
2011-02-24/a>
Johannes Ullrich
Windows 7 / 2008 R2 Service Pack 1 Problems
2011-02-23/a>
Johannes Ullrich
Windows 7 Service Pack 1 out
2011-02-16/a>
Jason Lam
Windows 0-day SMB mrxsmb.dll vulnerability
2011-02-10/a>
Chris Mohan
Befriending Windows Security Log Events
2011-01-24/a>
Rob VandenBrink
Where have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2011-01-04/a>
Johannes Ullrich
Microsoft Advisory: Vulnerability in Graphics Rendering Engine
2010-11-24/a>
Bojan Zdrnja
Privilege escalation 0-day in almost all Windows versions
2010-08-02/a>
Manuel Humberto Santander Pelaez
Securing Windows Internet Kiosk
2010-06-15/a>
Manuel Humberto Santander Pelaez
Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-02-11/a>
Deborah Hale
The Mysterious Blue Screen
2009-11-14/a>
Adrien de Beaupre
Microsoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>
Rob VandenBrink
Windows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-24/a>
Marcus Sachs
Windows 7 - How is it doing?
2009-09-08/a>
Guy Bruneau
Vista/2008/Windows 7 SMB2 BSOD 0Day
2009-08-26/a>
Johannes Ullrich
WSUS 3.0 SP2 released
2009-07-16/a>
Guy Bruneau
Changes in Windows Security Center
2009-07-02/a>
Daniel Wesemann
Time to update updating on PCs for 3rd party apps
2009-04-16/a>
Adrien de Beaupre
Strange Windows Event Log entry
2009-01-31/a>
Swa Frantzen
Windows 7 - not so secure ?
2008-08-15/a>
Jim Clausing
OMFW 2008 reflections
2008-06-12/a>
Bojan Zdrnja
Safari on Windows - not looking good
2008-05-17/a>
Lorna Hutcheson
XP SP3 Issues
2008-05-06/a>
John Bambenek
Windows XP Service Pack 3 Released
2008-05-01/a>
Adrien de Beaupre
Windows XP SteadyState
2008-04-29/a>
Bojan Zdrnja
Windows Service Pack blocker tool
2008-04-16/a>
William Stearns
Windows XP Service Pack 3 - unofficial schedule: Apr 21-28
2007-01-03/a>
Toby Kohlenberg
VLC Media Player udp URL handler Format String Vulnerability
EVENT
2024-07-08/a>
Xavier Mertens
Kunai: Keep an Eye on your Linux Hosts Activity
2020-02-12/a>
Rob VandenBrink
March Patch Tuesday is Coming - the LDAP Changes will Change Your Life!
2019-09-17/a>
Rob VandenBrink
Investigating Gaps in your Windows Event Logs
2018-06-21/a>
Xavier Mertens
Are Your Hunting Rules Still Working?
2016-08-29/a>
Russ McRee
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2014-08-15/a>
Tom Webb
AppLocker Event Logs with OSSEC 2.8
2014-01-04/a>
Tom Webb
Monitoring Windows Networks Using Syslog (Part One)
2013-02-28/a>
Daniel Wesemann
Parsing Windows Eventlogs in Powershell
2013-02-27/a>
Adam Swanger
Guest Diary: Dylan Johnson - There's value in them there logs!
2011-06-17/a>
Richard Porter
When do you stop owning Technology?
2010-09-26/a>
Daniel Wesemann
Egosurfing, the corporate way
2010-02-22/a>
Rob VandenBrink
New Risks in Penetration Testing
2009-04-24/a>
John Bambenek
Data Leak Prevention: Proactive Security Requirements of Breach Notification Laws
2009-04-16/a>
Adrien de Beaupre
Strange Windows Event Log entry
2008-06-23/a>
donald smith
Preventing SQL injection
LOGS
2024-03-29/a>
Xavier Mertens
Quick Forensics Analysis of Apache logs
2023-12-10/a>
Guy Bruneau
Honeypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-20/a>
Jesse La Grew
Overflowing Web Honeypot Logs
2023-08-31/a>
Guy Bruneau
Potential Weaponizing of Honeypot Logs [Guest Diary]
2023-07-23/a>
Guy Bruneau
Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-14/a>
Guy Bruneau
DShield Sensor Update
2023-01-21/a>
Guy Bruneau
DShield Sensor JSON Log to Elasticsearch
2023-01-08/a>
Guy Bruneau
DShield Sensor JSON Log Analysis
2022-12-21/a>
Guy Bruneau
DShield Sensor Setup in Azure
2021-10-11/a>
Johannes Ullrich
Things that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-09-11/a>
Guy Bruneau
Shipping to Elasticsearch Microsoft DNS Logs
2021-03-12/a>
Guy Bruneau
Microsoft DHCP Logs Shipped to ELK
2021-02-13/a>
Guy Bruneau
Using Logstash to Parse IPtables Firewall Logs
2020-07-23/a>
Xavier Mertens
Simple Blocklisting with MISP & pfSense
2020-01-12/a>
Guy Bruneau
ELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-07/a>
Guy Bruneau
Integrating Pi-hole Logs in ELK with Logstash
2019-09-17/a>
Rob VandenBrink
Investigating Gaps in your Windows Event Logs
2019-06-06/a>
Xavier Mertens
Keep an Eye on Your WMI Logs
2019-05-19/a>
Guy Bruneau
Is Metadata Only Approach, Good Enough for Network Traffic Analysis?
2018-07-17/a>
Xavier Mertens
Searching for Geographically Improbable Login Attempts
2018-06-21/a>
Xavier Mertens
Are Your Hunting Rules Still Working?
2017-07-09/a>
Russ McRee
Adversary hunting with SOF-ELK
2016-08-29/a>
Russ McRee
Recommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-06-01/a>
Xavier Mertens
Docker Containers Logging
2014-08-15/a>
Tom Webb
AppLocker Event Logs with OSSEC 2.8
2014-02-14/a>
Chris Mohan
Scanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-09/a>
Basil Alawi S.Taher
Mandiant Highlighter 2
2014-01-04/a>
Tom Webb
Monitoring Windows Networks Using Syslog (Part One)
2013-12-03/a>
Rob VandenBrink
Even in the Quietest Moments ...
2013-10-10/a>
Mark Hofman
CSAM Some more unusual scans
2012-12-02/a>
Guy Bruneau
Collecting Logs from Security Devices at Home
2012-07-13/a>
Russ McRee
2 for 1: SANSFIRE & MSRA presentations
2012-07-11/a>
Rick Wanner
Excellent Security Education Resources
2012-05-02/a>
Bojan Zdrnja
Monitoring VMWare logs
2012-04-08/a>
Chris Mohan
Blog Log: More noise or a rich source of intelligence?
2011-11-19/a>
Kevin Liston
Monitoring your Log Monitoring Process
2011-06-21/a>
Chris Mohan
Australian government security audit report shows tough love to agencies
2011-06-20/a>
Chris Mohan
Log files - are you reviewing yours?
2011-05-17/a>
Johannes Ullrich
A Couple Days of Logs: Looking for the Russian Business Network
2010-12-24/a>
Daniel Wesemann
A question of class
2010-04-06/a>
Daniel Wesemann
Application Logs
2010-03-10/a>
Rob VandenBrink
What's My Firewall Telling Me? (Part 4)
2010-02-23/a>
Mark Hofman
What is your firewall telling you and what is TCP249?
2010-01-29/a>
Johannes Ullrich
Analyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-20/a>
Johannes Ullrich
Weathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2009-10-26/a>
Johannes Ullrich
Web honeypot Update
2009-01-09/a>
Johannes Ullrich
SANS Log Management Survey
2008-08-19/a>
Johannes Ullrich
A morning stroll through my web logs
2008-08-05/a>
Daniel Wesemann
Watching those DNS logs
2006-09-18/a>
Jim Clausing
Log analysis follow up
2006-09-09/a>
Jim Clausing
Log Analysis tips?
2006-09-09/a>
Jim Clausing
A few preliminary log analysis thoughts
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Keep yourself informed with our
aggregate InfoSec news