Finding abuse contacts for a domain
One poster to the handlers list asked if there is an easy way to find the abuse contact for a domain. Abuse.net maintains a database of abuse contacts that's reachable via a web link or dns or whois lookup.
Keywords:
0 comment(s)
Cisco EIGRP Vulnerability and VLAN spoofing issue
Cisco has put out advisories today concerning vulnerabilities in their EIGRP and VLAN implementations. Their EIGRP post can be found at:
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040376.html
and the VLAN issue is at:
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040360.html
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040376.html
and the VLAN issue is at:
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/040360.html
Keywords:
0 comment(s)
Malware Analysis Quiz 5 results
For those following my Quizes, today I released the results of the Malware Analysis Quiz 5.
That one was really great and I would recommend those interested in malware analysis to read them!
Now, I will take a break of it until january and will post new quizes on 2006!
Thanks a lot for all submitters!
------------------------------------------------------
Pedro Bueno ( pbueno //&&// isc. sans. org)
That one was really great and I would recommend those interested in malware analysis to read them!
Now, I will take a break of it until january and will post new quizes on 2006!
Thanks a lot for all submitters!
------------------------------------------------------
Pedro Bueno ( pbueno //&&// isc. sans. org)
Keywords:
0 comment(s)
Wrap-up: What? No Link?
Our handler Lorna Hutcheson, in her diary from December 7th, noted the dangers of posting URLs, in particular clickable URLs, on our site. To drive the point home, we added a "suspect" URL, and we tracked how many people clicked on it.We had about 1,000 users click on the link. 80% used the same browser they used to read the diary, so I consider them "production browsers". 10% used "safe browsers" like wget. The remainders are bots/search engines that followed the link.Most people who responded to the diary noted that they do need access to malicious code (and malicious URLs) in order to be able to block them at their web proxies, or that they use safe browsers to access suspicious links. We will continue to post links in our diaries. It is up to the particular handler to decide if it is appropriate to obfuscate the URL, post a partial URL, or not post it at all if it is deemed not appropriate or too risky.
About 20-40,000 users typically read a diary, so 1,000 is not all that large of a number, but still considerable.
About 20-40,000 users typically read a diary, so 1,000 is not all that large of a number, but still considerable.
Keywords:
0 comment(s)
×
Diary Archives
Comments