The 2nd part of the "Weathering the Storm" blog series is now live [1]. In this series, I am looking at our web logs from isc.sans.org for attacks. I picked Remote File Inclusion (RFI) attacks because we are getting thousands a day. Just take a quick look at our web honeypot project [2]. Most of the attacks we detect are RFI attacks. [1] http://blogs.sans.org/appsecstreetfighter/2010/01/29/weathering-the-storm-part-2-a-day-of-weblogs-at-the-internet-storm-center/
------ |
Johannes 4069 Posts ISC Handler Jan 29th 2010 |
Thread locked Subscribe |
Jan 29th 2010 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!