Internet Storm Center

Sign In Sign Up
Watch ISC TV. Great for NOCs, SOCs and Living Rooms: https://isctv.sans.edu
Handler on Duty: Tom Webb
Threat Level: green

Jesse La Grew Diaries

Back to Handlers

  • DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
  • Common usernames submitted to honeypots
  • What is the origin of passwords submitted to honeypots?
  • Command Line Parsing - Are These Really Unique Strings?
  • DShield Honeypot Maintenance and Data Retention
  • IDS Comparisons with DShield Honeypot Data
  • More Data Enrichment for Cowrie Logs
  • Signals Defense With Faraday Bags & Flipper Zero
  • Exploration of DShield Cowrie Data with jq
  • Network Data Collector Placement Makes a Difference
  • PCAP Data Analysis with Zeek
  • Rotating Packet Captures with pfSense
  • DShield Honeypot Setup with pfSense
  • Opening the Door for a Knock: Creating a Custom DShield Listener
  • Extracting 'HTTP CONNECT' Requests with Python
  • Homepage
  • Diaries
  • Podcasts
  • Jobs
  • Data
    • TCP/UDP Port Activity
    • Port Trends
    • SSH/Telnet Scanning Activity
    • Weblogs
    • Threat Feeds Activity
    • Threat Feeds Map
    • Useful InfoSec Links
    • Presentations & Papers
    • Research Papers
    • API
  • Tools
    • DShield Sensor
    • DNS Looking Glass
    • Honeypot (RPi/AWS)
    • InfoSec Glossary
  • Contact Us
    • Contact Us
    • About Us
    • Handlers
Slack Channel
Mastodon
Twitter

Learn about the Internet Storm Center and our volunteer InfoSec handlers

© 2023 SANS™ Internet Storm Center Developers: We have an API for you!   Creative Commons License
  • Link To Us
  • About Us
  • Handlers
  • Privacy Policy