Date Author Title
2024-04-07Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2024-03-17Guy BruneauGamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-10Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-03Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-25Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-18Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2023-12-27Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-20Guy BruneauHow to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-12-10Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-22Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-09Guy BruneauRouters Targeted for Gafgyt Botnet [Guest Diary]
2023-09-09Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-08-31Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-23Guy BruneauHow I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary]