Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
PE ANALYSIS
2014-07-05
Guy Bruneau
Malware Analysis with pedump
PE
2024-10-24/a>
Johannes Ullrich
Development Features Enabled in Prodcution
2024-10-09/a>
Xavier Mertens
From Perfctl to InfoStealer
2024-09-16/a>
Xavier Mertens
Managing PE Files With Overlays
2024-08-22/a>
Johannes Ullrich
OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-08-14/a>
Xavier Mertens
Multiple Malware Dropped Through MSI Package
2024-06-20/a>
Guy Bruneau
No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-02-29/a>
Jesse La Grew
[Guest Diary] Dissecting DarkGate: Modular Malware Delivery and Persistence as a Service.
2023-11-16/a>
Johannes Ullrich
Beyond -n: Optimizing tcpdump performance
2023-06-27/a>
Xavier Mertens
The Importance of Malware Triage
2023-06-24/a>
Guy Bruneau
Email Spam with Attachment Modiloader
2023-06-19/a>
Xavier Mertens
Malware Delivered Through .inf File
2023-05-26/a>
Xavier Mertens
Using DFIR Techniques To Recover From Infrastructure Outages
2023-05-16/a>
Jesse La Grew
Signals Defense With Faraday Bags & Flipper Zero
2023-05-14/a>
Guy Bruneau
VMware Aria Operations addresses multiple Local Privilege Escalations and a Deserialization issue
2023-02-25/a>
Didier Stevens
Crypto Inside a Browser
2022-11-02/a>
Rob VandenBrink
Breakpoints in Burp
2022-10-17/a>
Xavier Mertens
Fileless Powershell Dropper
2022-09-22/a>
Xavier Mertens
RAT Delivered Through FODHelper
2022-09-03/a>
Didier Stevens
Video: James Webb JPEG With Malware
2022-09-02/a>
Didier Stevens
James Webb JPEG With Malware
2022-08-22/a>
Xavier Mertens
32 or 64 bits Malware?
2022-07-05/a>
Jan Kopriva
EternalBlue 5 years after WannaCry and NotPetya
2022-06-20/a>
Johannes Ullrich
Odd TCP Fast Open Packets. Anybody understands why?
2022-05-29/a>
Didier Stevens
Extracting The Overlay Of A PE File
2022-05-28/a>
Didier Stevens
Huge Signed PE File: Keeping The Signature
2022-05-26/a>
Didier Stevens
Huge Signed PE File
2022-04-11/a>
Johannes Ullrich
Spring: It isn't just about Spring4Shell. Spring Cloud Function Vulnerabilities are being probed too.
2022-03-30/a>
Johannes Ullrich
Java Springtime Confusion: What Vulnerability are We Talking About
2022-03-18/a>
Johannes Ullrich
Scans for Movable Type Vulnerability (CVE-2021-20837)
2022-03-04/a>
Johannes Ullrich
Scam E-Mail Impersonating Red Cross
2022-03-03/a>
Johannes Ullrich
Attackers Search For Exposed "LuCI" Folders: Help me understand this attack
2022-02-11/a>
Xavier Mertens
CinaRAT Delivered Through HTML ID Attributes
2022-01-31/a>
Xavier Mertens
Be careful with RPMSG files
2021-12-31/a>
Jan Kopriva
Do you want your Agent Tesla in the 300 MB or 8 kB package?
2021-12-21/a>
Xavier Mertens
More Undetected PowerShell Dropper
2021-10-30/a>
Guy Bruneau
Remote Desktop Protocol (RDP) Discovery
2021-08-04/a>
Yee Ching Tok
Pivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-07-24/a>
Bojan Zdrnja
Active Directory Certificate Services (ADCS - PKI) domain admin vulnerability
2021-07-20/a>
Bojan Zdrnja
Summer of SAM - incorrect permissions on Windows 10/11 hives
2021-06-18/a>
Daniel Wesemann
Open redirects ... and why Phishers love them
2021-05-29/a>
Guy Bruneau
Spear-phishing Email Targeting Outlook Mail Clients
2021-05-14/a>
Xavier Mertens
"Open" Access to Industrial Systems Interface is Also Far From Zero
2021-04-22/a>
Xavier Mertens
How Safe Are Your Docker Images?
2021-03-16/a>
Jan Kopriva
50 years of malware? Not really. 50 years of computer worms? That's a different story...
2021-03-04/a>
Xavier Mertens
From VBS, PowerShell, C Sharp, Process Hollowing to RAT
2021-01-11/a>
Rob VandenBrink
Using the NVD Database and API to Keep Up with Vulnerabilities and Patches - Tool Drop: CVEScan (Part 3 of 3)
2021-01-07/a>
Rob VandenBrink
Using the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3)
2020-12-29/a>
Jan Kopriva
Want to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-11-19/a>
Xavier Mertens
PowerShell Dropper Delivering Formbook
2020-08-25/a>
Xavier Mertens
Keep An Eye on LOLBins
2020-08-10/a>
Bojan Zdrnja
Scoping web application and web service penetration tests
2020-06-30/a>
Russ McRee
ISC Snapshot: SpectX IP Hitcount Query
2020-06-11/a>
Xavier Mertens
Anti-Debugging JavaScript Techniques
2020-05-15/a>
Rob VandenBrink
SHA3 Hashes (on Windows) - Where Art Thou?
2020-04-21/a>
Russ McRee
SpectX: Log Parser for DFIR
2020-03-26/a>
Xavier Mertens
Very Large Sample as Evasion Technique?
2020-03-15/a>
Guy Bruneau
VPN Access and Activity Monitoring
2019-12-04/a>
Jan Kopriva
Analysis of a strangely poetic malware
2019-11-29/a>
Russ McRee
ISC Snapshot: Search with SauronEye
2019-10-22/a>
Bojan Zdrnja
Testing TLSv1.3 and supported ciphers
2019-08-28/a>
Johannes Ullrich
[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2019-08-22/a>
Xavier Mertens
Simple Mimikatz & RDPWrapper Dropper
2019-08-21/a>
Russ McRee
KAPE: Kroll Artifact Parser and Extractor
2019-08-15/a>
Didier Stevens
Analysis of a Spearphishing Maldoc
2019-07-24/a>
Xavier Mertens
May People Be Considered as IOC?
2019-05-16/a>
Xavier Mertens
The Risk of Authenticated Vulnerability Scans
2019-04-26/a>
Rob VandenBrink
Pillaging Passwords from Service Accounts
2019-04-01/a>
Didier Stevens
Analysis of PDFs Created with OpenOffice/LibreOffice
2019-03-15/a>
Remco Verhoef
Binary Analysis with Jupyter and Radare2
2019-02-17/a>
Didier Stevens
Video: Finding Property Values in Office Documents
2019-02-16/a>
Didier Stevens
Finding Property Values in Office Documents
2019-01-05/a>
Didier Stevens
A Malicious JPEG? Second Example
2019-01-04/a>
Didier Stevens
A Malicious JPEG?
2018-11-27/a>
Xavier Mertens
More obfuscated shell scripts: Fake MacOS Flash update
2018-11-26/a>
Russ McRee
ViperMonkey: VBA maldoc deobfuscation
2018-11-04/a>
Pasquale Stirparo
Beyond good ol' LaunchAgent - part 1
2018-10-26/a>
Xavier Mertens
Dissecting Malicious Office Documents with Linux
2018-10-21/a>
Pasquale Stirparo
Beyond good ol’ LaunchAgent - part 0
2018-10-08/a>
Guy Bruneau
Latest Release of rockNSM 2.1
2018-08-20/a>
Didier Stevens
OpenSSH user enumeration (CVE-2018-15473)
2018-07-11/a>
Remco Verhoef
Well, Hello Again Peppa!
2018-06-07/a>
Remco Verhoef
Automated twitter loot collection
2018-05-24/a>
Xavier Mertens
"Blocked" Does Not Mean "Forget It"
2018-05-07/a>
Xavier Mertens
Adding Persistence Via Scheduled Tasks
2018-04-28/a>
Rick Wanner
Microsoft Security Update for Spectre V2
2018-01-28/a>
Didier Stevens
Is this a pentest?
2018-01-10/a>
Russ McRee
GitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer
2018-01-08/a>
Bojan Zdrnja
Meltdown and Spectre: clearing up the confusion
2017-11-25/a>
Guy Bruneau
Benefits associated with the use of Open Source Software
2017-11-07/a>
Xavier Mertens
Interesting VBA Dropper
2017-10-30/a>
Didier Stevens
PE files and debug info
2017-10-08/a>
Didier Stevens
A strange JPEG file
2017-09-10/a>
Didier Stevens
Analyzing JPEG files
2017-09-06/a>
Adrien de Beaupre
Modern Web Application Penetration Testing , Hash Length Extension Attacks
2017-08-10/a>
Didier Stevens
Maldoc Analysis with ViperMonkey
2017-07-02/a>
Didier Stevens
PE Section Name Descriptions
2017-06-28/a>
Brad Duncan
Petya? I hardly know ya! - an ISC update on the 2017-06-27 ransomware outbreak
2017-05-18/a>
Xavier Mertens
My Little CVE Bot
2017-05-05/a>
Xavier Mertens
HTTP Headers... the Achilles' heel of many applications
2017-04-02/a>
Guy Bruneau
IPFire - A Household Multipurpose Security Gateway
2016-11-25/a>
Xavier Mertens
Free Software Quick Security Checklist
2016-11-02/a>
Rob VandenBrink
What Does a Pentest Look Like?
2016-09-28/a>
Xavier Mertens
SNMP Pwn3ge
2016-09-04/a>
Russ McRee
Kali Linux 2016.2 Release: https://www.kali.org/news/kali-linux-20162-release/
2016-07-28/a>
Bojan Zdrnja
Verifying SSL/TLS certificates manually
2016-07-27/a>
Xavier Mertens
Critical Xen PV guests vulnerabilities
2016-06-15/a>
Richard Porter
Warp Speed Ahead, L7 Open Source Packet Generator: Warp17
2016-05-21/a>
Didier Stevens
Python Malware - Part 2
2016-05-03/a>
Rick Wanner
OpenSSL Updates
2016-04-25/a>
Guy Bruneau
Highlights from the 2016 HPE Annual Cyber Threat Report
2016-02-27/a>
Guy Bruneau
OpenSSL Security Update Planned for 1 March Release
2016-02-22/a>
Xavier Mertens
Reducing False Positives with Open Data Sources
2016-02-18/a>
Xavier Mertens
Hunting for Executable Code in Windows Environments
2016-02-03/a>
Xavier Mertens
Automating Vulnerability Scans
2016-01-31/a>
Guy Bruneau
OpenSSL 1.0.2 Advisory and Update
2016-01-30/a>
Xavier Mertens
All CVE Details at Your Fingertips
2016-01-20/a>
Xavier Mertens
/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-12-23/a>
Rob VandenBrink
Libraries and Dependencies - It Really is Turtles All The Way Down!
2015-12-22/a>
Rick Wanner
The other Juniper vulnerability - CVE-2015-7756
2015-11-22/a>
Guy Bruneau
OpenDNS Research Used to Predict Threat
2015-11-09/a>
John Bambenek
ICYMI: Widespread Unserialize Vulnerability in Java
2015-10-27/a>
Xavier Mertens
The "Yes, but..." syndrome
2015-03-17/a>
Didier Stevens
From PEiD To YARA
2015-02-17/a>
Rob VandenBrink
A Different Kind of Equation
2014-08-23/a>
Guy Bruneau
NSS Labs Cyber Resilience Report
2014-08-12/a>
Adrien de Beaupre
Host discovery with nmap
2014-08-09/a>
Adrien de Beaupre
Complete application ownage via Multi-POST XSRF
2014-08-06/a>
Chris Mohan
OpenSSL Security Advisories http://www.openssl.org/news/secadv_20140806.txt
2014-08-04/a>
Russ McRee
Threats & Indicators: A Security Intelligence Lifecycle
2014-07-05/a>
Guy Bruneau
Malware Analysis with pedump
2014-06-12/a>
Johannes Ullrich
Metasploit now includes module to exploit CVE-2014-0195 (OpenSSL DTLS Fragment Vuln.)
2014-06-05/a>
Johannes Ullrich
Critical OpenSSL Patch Available. Patch Now!
2014-06-05/a>
Johannes Ullrich
Internet Storm Center Briefing on OpenSSL Vulnerabilities today at 12pm ET (8am PT/4pm UTC) https://www.sans.org/webcasts/98445
2014-06-05/a>
Johannes Ullrich
More Details Regarding CVE-2014-0195 (DTLS arbitrary code execution)
2014-06-05/a>
Johannes Ullrich
Updated OpenSSL Patch Presentation
2014-04-26/a>
Guy Bruneau
New Project by Linux Foundation - Core Infrastructure Initiative
2014-04-21/a>
Daniel Wesemann
OpenSSL Rampage
2014-04-21/a>
Daniel Wesemann
Finding the bleeders
2014-04-15/a>
Richard Porter
VMWare Advisory VMSA-2014-0004 - Updates on OpenSSL HeartBleed http://www.vmware.com/security/advisories/VMSA-2014-0004.html
2014-04-14/a>
Kevin Shortt
INFOCon Green: Heartbleed - on the mend
2014-04-11/a>
Johannes Ullrich
Tonight OpenSSL Webcast #4: Client Side Issues / What to tell your kids & managers about it https://www.sans.org/webcasts/side-heartbleed-client-vulnerabilities-98135
2014-04-08/a>
Guy Bruneau
OpenSSL CVE-2014-0160 Fixed
2014-04-08/a>
Johannes Ullrich
* Patch Now: OpenSSL "Heartbleed" Vulnerability
2014-04-01/a>
Basil Alawi S.Taher
Upgrading Your Android, Elevating My Malware
2014-01-02/a>
John Bambenek
OpenSSL.org Defaced by Attackers Gaining Access to Hypervisor
2014-01-01/a>
Russ McRee
Happy New Year from the Syrian Electronic Army - Skype’s Social Media Accounts Hacked
2014-01-01/a>
Russ McRee
Six degrees of celebration: Juniper, ANT, Shodan, Maltego, Cisco, and Tails
2013-12-29/a>
Russ McRee
OpenSSL suffers apparent defacement
2013-12-21/a>
Guy Bruneau
Strange DNS Queries - Request for Packets
2013-12-19/a>
Rob VandenBrink
Target US - Credit Card Data Breach
2013-12-16/a>
Tom Webb
The case of Minerd
2013-12-01/a>
Richard Porter
BPF, PCAP, Binary, hex, why they matter?
2013-11-13/a>
Johannes Ullrich
Packet Challenge for the Hivemind: What's happening with this Ethernet header?
2013-10-26/a>
Guy Bruneau
Active Perl/Shellbot Trojan
2013-10-25/a>
Rob VandenBrink
Kaspersky flags TCPIP.SYS as Malware
2013-10-22/a>
Richard Porter
Greenbone and OpenVAS Scanner
2013-09-05/a>
Rob VandenBrink
Building Your Own GPU Enabled Private Cloud
2013-08-21/a>
Rob VandenBrink
Fibre Channel Reconnaissance - Reloaded
2013-05-20/a>
Guy Bruneau
Safe - Tools, Tactics and Techniques
2013-04-25/a>
Adam Swanger
Guest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-03-18/a>
Kevin Shortt
Cisco IOS Type 4 Password Issue: http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4
2013-03-13/a>
Johannes Ullrich
IPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability
2013-02-25/a>
Johannes Ullrich
Trustwave Trustkeeper Phish
2013-02-25/a>
Johannes Ullrich
Punkspider enumerates web application vulnerabilities
2013-02-11/a>
John Bambenek
OpenSSL 1.0.1e Released with Corrected fix for CVE-2013-1069, more here: http://www.openssl.org/
2013-02-04/a>
Adam Swanger
SAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2013-01-15/a>
Rob VandenBrink
When Disabling IE6 (or Java, or whatever) is not an Option...
2012-12-06/a>
Johannes Ullrich
How to identify if you are behind a "Transparent Proxy"
2012-12-04/a>
Johannes Ullrich
Where do your backup tapes go to die?
2012-11-14/a>
Jim Clausing
Skype account hijack vulnerability fixed
2012-09-19/a>
Russ McRee
Script kiddie scavenging with Shellbot.S
2012-08-17/a>
Guy Bruneau
Suspicious eFax Spear Phishing Messages
2012-08-02/a>
Guy Bruneau
Opera Security Update
2012-07-21/a>
Rick Wanner
OpenDNS is looking for a few good malware people!
2012-05-06/a>
Jim Clausing
Tool updates and Win 8
2012-05-01/a>
Rob VandenBrink
Are Open SSIDs in decline?
2012-04-24/a>
Russ McRee
OpenSSL reissues fix for ASN1 BIO vulnerability
2012-04-19/a>
Kevin Shortt
OpenSSL Security Advisory - CVE-2012-2110
2012-03-27/a>
Guy Bruneau
Opera 11.62 for Windows patch several bugs and vulnerabilities - http://www.opera.com/docs/changelogs/windows/1162/
2012-03-12/a>
Guy Bruneau
OpenSSL Security Update
2012-01-13/a>
Guy Bruneau
Strange DNS Queries - Request Packets/Logs
2012-01-07/a>
Scott Fendley
Updated OpenDLP
2011-11-07/a>
Rob VandenBrink
Stuff I Learned Scripting - Evaluating a Remote SSL Certificate
2011-11-07/a>
Rob VandenBrink
Juniper BGP issues causing locallized Internet Problems
2011-11-04/a>
Guy Bruneau
Duqu Mitigation
2011-10-26/a>
Rick Wanner
Critical Control 17:Penetration Tests and Red Team Exercises
2011-08-26/a>
Daniel Wesemann
User Agent 007
2011-07-19/a>
Richard Porter
SMS Phishing at the SANSFire 2011 Handler Dinner
2011-06-28/a>
Johannes Ullrich
Update: Opera 11.50 is now available http://www.opera.com/
2011-06-04/a>
Rick Wanner
Do you have a personal disaster recovery plan?
2011-05-31/a>
Johannes Ullrich
Skype EasyBits Add-on
2011-05-09/a>
Rick Wanner
Serious flaw in OpenID
2011-05-09/a>
Rick Wanner
VUPEN Security pwns Google Chrome
2011-05-06/a>
Richard Porter
Unpatched Exploit: Skype for MAC
2011-04-18/a>
John Bambenek
Wordpress.com Security Breach
2011-03-16/a>
Johannes Ullrich
Analyzing HTTP Packet Captures
2011-02-21/a>
Adrien de Beaupre
Kaspersky update servers unreachable
2011-02-19/a>
Guy Bruneau
Snort Data Acquisition Library
2011-02-05/a>
Guy Bruneau
OpenSSH Legacy Certificate Information Disclosure Vulnerability
2011-01-28/a>
Guy Bruneau
OpenOffice Security Fixes
2011-01-27/a>
Chris Carboni
Opera Updates
2011-01-12/a>
Richard Porter
How Many Loyalty Cards do you Carry?
2010-12-30/a>
Rick Wanner
Obvious Lessons from the Skype outage
2010-12-15/a>
Johannes Ullrich
OpenBSD IPSec "Backdoor"
2010-11-19/a>
Jason Lam
Exchanging and sharing of assessment results
2010-11-16/a>
Guy Bruneau
OpenSSL TLS Extension Parsing Race Condition
2010-11-08/a>
Manuel Humberto Santander Pelaez
Network Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-10-22/a>
Manuel Humberto Santander Pelaez
Intypedia project
2010-10-12/a>
Adrien de Beaupre
New version of Opera- Opera 10.63 is a recommended upgrade offering security and stability enhancements: http://www.opera.com/browser/download/
2010-09-16/a>
Johannes Ullrich
OpenX Ad-Server Vulnerability
2010-09-09/a>
Jim Clausing
Opera 10.62 - security (the DLL path issue) and stability upate see http://www.opera.com/docs/changelogs/windows/1062/
2010-08-23/a>
Manuel Humberto Santander Pelaez
Firefox plugins to perform penetration testing activities
2010-08-19/a>
Daniel Wesemann
Casper the unfriendly ghost
2010-08-16/a>
Raul Siles
Blind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>
Manuel Humberto Santander Pelaez
Opensolaris project cancelled, replaced by Solaris 11 express
2010-08-05/a>
Manuel Humberto Santander Pelaez
Adobe Acrobat Font Parsing Integer Overflow Vulnerability
2010-07-24/a>
Manuel Humberto Santander Pelaez
Types of diary: One liners vs full diary
2010-06-23/a>
Scott Fendley
Opera Browser Update
2010-06-06/a>
Manuel Humberto Santander Pelaez
Nice OS X exploit tutorial
2010-06-05/a>
Guy Bruneau
OpenOffice.org 3.2.1 Fixes Bugs and Vulnerabilities
2010-06-02/a>
Mark Hofman
OpenSSL version 1.0.0a released. This fixes a number of security issues. Don't forget a number of commercial appliances will be using this, so look for vendor updates soon.
2010-05-22/a>
Rick Wanner
SANS 2010 Digital Forensics Summit - APT Based Forensic Challenge
2010-04-25/a>
Raul Siles
Manual Verification of SSL/TLS Certificate Trust Chains using Openssl
2010-04-13/a>
Adrien de Beaupre
Web App Testing Tools
2010-03-29/a>
Adrien de Beaupre
OpenSSL V 1.0.0 released!
2010-03-24/a>
Kyle Haugsness
Wikipedia outage
2010-03-22/a>
Guy Bruneau
New Opera 10.51 available with security fixes. More information available at: http://www.opera.com/docs/changelogs/windows/1051/
2010-03-11/a>
donald smith
Cert write up on Skype IMBot Logic and Functionality.
2010-03-05/a>
Kyle Haugsness
Unpatched Opera 10.50 and below code execution vulnerability
2010-02-26/a>
Rick Wanner
OpenSSL 0.9.8m released.
2010-02-22/a>
Rob VandenBrink
Multiple Security Updates for OpenOffice ==> http://www.openoffice.org/security/bulletin.html
2010-02-22/a>
Rob VandenBrink
New Risks in Penetration Testing
2010-02-01/a>
Rob VandenBrink
NMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-27/a>
Raul Siles
European Union Security Challenge (Campus Party 2010)
2010-01-19/a>
Jim Clausing
Apple Security Update 2010-001
2009-11-17/a>
Guy Bruneau
OpenVPN Fixed OpenSSL Session Renegotiation Issue
2009-11-06/a>
Andre Ludwig
New version of OpenSSL released - OpenSSL 0.9.8l
2009-10-26/a>
Johannes Ullrich
Today: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-10-02/a>
Stephen Hall
New version of OpenSSH released
2009-09-01/a>
Guy Bruneau
Opera 10 with Security Fixes
2009-07-27/a>
Raul Siles
New Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2009-07-09/a>
Bojan Zdrnja
OpenSSH 0day FUD
2009-07-07/a>
Marcus Sachs
OpenSSH Rumors
2009-07-03/a>
Adrien de Beaupre
Happy 4th of July!
2009-05-31/a>
Tony Carothers
L0phtcrack is Back!
2009-05-25/a>
Jim Clausing
More tools for (US) Memorial Day
2009-05-01/a>
Adrien de Beaupre
OpenBSD 4.5
2009-04-26/a>
Johannes Ullrich
Odd DNS Resolution for Google via OpenDNS
2009-04-21/a>
Bojan Zdrnja
Web application vulnerabilities
2009-04-07/a>
Johannes Ullrich
Common Apache Misconception
2009-03-03/a>
Kyle Haugsness
Opera browser security updates
2009-03-01/a>
Jim Clausing
Cool combination of tools
2009-01-08/a>
Kyle Haugsness
BIND OpenSSL follow-up
2008-12-17/a>
donald smith
Opera 9.6.3 released with security fixes
2008-11-05/a>
donald smith
If you missed President Elect Obamas speech have some malware instead
2008-10-31/a>
Rick Wanner
Sprint-Cogent Peering Issue
2008-10-30/a>
Kevin Liston
Opera 9.62 available - security update
2008-10-22/a>
Mari Nichols
Opera 9.6.1 Released
2008-10-07/a>
Kyle Haugsness
Cogent peering problems
2008-09-20/a>
Rick Wanner
New (to me) nmap Features
2008-08-20/a>
Adrien de Beaupre
From the mailbag, Opera 9.52...
2008-07-11/a>
Jim Clausing
Handling the load
2008-07-03/a>
Bojan Zdrnja
New Opera v9.51 fixes couple of security issues
2008-07-02/a>
Jim Clausing
Another little script I threw together
2008-06-16/a>
Kevin Liston
Opera 9.5 is Available
2008-06-10/a>
Swa Frantzen
Ransomware keybreaking
2008-06-09/a>
Scott Fendley
So Where Are Those OpenSSH Key-based Attacks?
2008-05-16/a>
Daniel Wesemann
INFOcon back to green
2008-05-15/a>
Bojan Zdrnja
Debian and Ubuntu users: fix your keys/certificates NOW
2008-05-15/a>
Bojan Zdrnja
INFOCon yellow: update your Debian generated keys/certs ASAP
2008-05-13/a>
Swa Frantzen
OpenSSH: Predictable PRNG in debian and ubuntu Linux
2008-04-23/a>
Mari Nichols
What's New, Old and Morphing?
2008-04-14/a>
John Bambenek
A Federal Subpoena or Just Some More Spam & Malware?
2008-04-03/a>
Bojan Zdrnja
Opera fixes vulnerabilities and Microsoft announces April's fixes
2006-12-18/a>
Toby Kohlenberg
Skype worm
2006-11-29/a>
Toby Kohlenberg
New Vulnerability Announcement and patches from Apple
2006-09-13/a>
Swa Frantzen
PHP - shared hosters, take note.
ANALYSIS
2024-10-17/a>
Guy Bruneau
Scanning Activity from Subnet 15.184.0.0/16
2024-09-25/a>
Guy Bruneau
OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-18/a>
Guy Bruneau
Time-to-Live Analysis of DShield Data with Vega-Lite
2024-09-11/a>
Guy Bruneau
Hygiene, Hygiene, Hygiene! [Guest Diary]
2024-08-27/a>
Guy Bruneau
Vega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-16/a>
Jesse La Grew
[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-06-13/a>
Guy Bruneau
The Art of JQ and Command-line Fu [Guest Diary]
2024-05-28/a>
Guy Bruneau
Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-29/a>
Guy Bruneau
Linux Trojan - Xorddos with Filename eyshcjdmzg
2024-03-29/a>
Xavier Mertens
Quick Forensics Analysis of Apache logs
2024-02-25/a>
Guy Bruneau
Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-03/a>
Guy Bruneau
DShield Sensor Log Collection with Elasticsearch
2023-11-17/a>
Jan Kopriva
Phishing page with trivial anti-analysis features
2023-02-04/a>
Guy Bruneau
Assemblyline as a Malware Analysis Sandbox
2023-01-21/a>
Guy Bruneau
DShield Sensor JSON Log to Elasticsearch
2023-01-08/a>
Guy Bruneau
DShield Sensor JSON Log Analysis
2022-07-29/a>
Johannes Ullrich
PDF Analysis Intro and OpenActions Entries
2022-07-18/a>
Didier Stevens
Adding Your Own Keywords To My PDF Tools
2022-06-01/a>
Jan Kopriva
HTML phishing attachments - now with anti-analysis features
2021-04-10/a>
Guy Bruneau
Building an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-04-06/a>
Jan Kopriva
Malspam with Lokibot vs. Outlook and RFCs
2021-01-30/a>
Guy Bruneau
PacketSifter as Network Parsing and Telemetry Tool
2021-01-14/a>
Bojan Zdrnja
Dynamically analyzing a heavily obfuscated Excel 4 macro malicious file
2020-12-03/a>
Brad Duncan
Traffic Analysis Quiz: Mr Natural
2020-11-11/a>
Brad Duncan
Traffic Analysis Quiz: DESKTOP-FX23IK5
2020-10-01/a>
Daniel Wesemann
Making sense of Azure AD (AAD) activity logs
2020-09-20/a>
Guy Bruneau
Analysis of a Salesforce Phishing Emails
2020-06-01/a>
Jim Clausing
Stackstrings, type 2
2020-05-02/a>
Guy Bruneau
Phishing PDF with Unusual Hostname
2020-01-25/a>
Guy Bruneau
Is Threat Hunting the new Fad?
2020-01-12/a>
Guy Bruneau
ELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-29/a>
Guy Bruneau
ELK Dashboard for Pihole Logs
2019-12-07/a>
Guy Bruneau
Integrating Pi-hole Logs in ELK with Logstash
2019-11-23/a>
Guy Bruneau
Local Malware Analysis with Malice
2019-10-18/a>
Xavier Mertens
Quick Malicious VBS Analysis
2019-06-27/a>
Rob VandenBrink
Finding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-14/a>
Jim Clausing
A few Ghidra tips for IDA users, part 4 - function call graphs
2019-04-17/a>
Jim Clausing
A few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-08/a>
Jim Clausing
A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03/a>
Jim Clausing
A few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-03-31/a>
Didier Stevens
Maldoc Analysis of the Weekend by a Reader
2019-02-27/a>
Didier Stevens
Maldoc Analysis by a Reader
2018-11-18/a>
Guy Bruneau
Multipurpose PCAP Analysis Tool
2018-10-21/a>
Pasquale Stirparo
Beyond good ol’ LaunchAgent - part 0
2018-08-31/a>
Jim Clausing
Quickie: Using radare2 to disassemble shellcode
2018-06-01/a>
Remco Verhoef
Binary analysis with Radare2
2017-09-29/a>
Lorna Hutcheson
Good Analysis = Understanding(tools + logs + normal)
2017-07-09/a>
Russ McRee
Adversary hunting with SOF-ELK
2017-04-28/a>
Russell Eubanks
KNOW before NO
2017-01-28/a>
Lorna Hutcheson
Packet Analysis - Where do you start?
2016-12-24/a>
Didier Stevens
Pinging All The Way
2016-10-30/a>
Pasquale Stirparo
Volatility Bot: Automated Memory Analysis
2016-10-17/a>
Didier Stevens
Maldoc VBA Anti-Analysis: Video
2016-10-15/a>
Didier Stevens
Maldoc VBA Anti-Analysis
2016-05-14/a>
Guy Bruneau
INetSim as a Basic Honeypot
2016-04-21/a>
Daniel Wesemann
Decoding Pseudo-Darkleech (Part #2)
2015-05-03/a>
Russ McRee
VolDiff, for memory image differential analysis
2014-07-05/a>
Guy Bruneau
Malware Analysis with pedump
2014-04-21/a>
Daniel Wesemann
Finding the bleeders
2014-03-13/a>
Daniel Wesemann
Web server logs containing RS=^ ?
2014-01-14/a>
Chris Mohan
Spamming and scanning botnets - is there something I can do to block them from my site?
2013-10-28/a>
Daniel Wesemann
Exploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-06-18/a>
Russ McRee
Volatility rules...any questions?
2013-05-11/a>
Lenny Zeltser
Extracting Digital Signatures from Signed Malware
2013-03-09/a>
Guy Bruneau
IPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-02-03/a>
Lorna Hutcheson
Is it Really an Attack?
2013-01-08/a>
Jim Clausing
Cuckoo 0.5 is out and the world didn't end
2012-12-02/a>
Guy Bruneau
Collecting Logs from Security Devices at Home
2012-09-19/a>
Kevin Liston
Volatility: 2.2 is Coming Soon
2012-09-14/a>
Lenny Zeltser
Analyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-21/a>
Russ McRee
Analysis of drive-by attack sample set
2012-06-04/a>
Lenny Zeltser
Decoding Common XOR Obfuscation in Malicious Code
2012-05-23/a>
Mark Baggett
IP Fragmentation Attacks
2012-03-03/a>
Jim Clausing
New automated sandbox for Android malware
2012-02-07/a>
Jim Clausing
Book Review: Practical Packet Analysis, 2nd ed
2011-05-20/a>
Guy Bruneau
Sysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-04-14/a>
Adrien de Beaupre
Sysinternals updates, a new blog post, and webcast
2011-02-01/a>
Lenny Zeltser
The Importance of HTTP Headers When Investigating Malicious Sites
2010-08-09/a>
Jim Clausing
Free/inexpensive tools for monitoring systems/networks
2010-07-21/a>
Adrien de Beaupre
autorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-05-26/a>
Bojan Zdrnja
Malware modularization and AV detection evasion
2010-04-11/a>
Marcus Sachs
Network and process forensics toolset
2010-03-26/a>
Daniel Wesemann
Getting the EXE out of the RTF again
2010-02-13/a>
Lorna Hutcheson
Network Traffic Analysis in Reverse
2010-01-14/a>
Bojan Zdrnja
PDF Babushka
2010-01-07/a>
Daniel Wesemann
Static analysis of malicious PDFs
2010-01-07/a>
Daniel Wesemann
Static analysis of malicous PDFs (Part #2)
2009-11-25/a>
Jim Clausing
Updates to my GREM Gold scripts and a new script
2009-11-03/a>
Bojan Zdrnja
Opachki, from (and to) Russia with love
2009-09-25/a>
Lenny Zeltser
Categories of Common Malware Traits
2009-07-26/a>
Jim Clausing
New Volatility plugins
2009-07-02/a>
Daniel Wesemann
Getting the EXE out of the RTF
2009-04-15/a>
Marcus Sachs
2009 Data Breach Investigation Report
2009-03-13/a>
Bojan Zdrnja
When web application security, Microsoft and the AV vendors all fail
2009-02-10/a>
Bojan Zdrnja
More tricks from Conficker and VM detection
2009-02-09/a>
Bojan Zdrnja
Some tricks from Conficker's bag
2009-01-18/a>
Daniel Wesemann
3322. org
2009-01-15/a>
Bojan Zdrnja
Conficker's autorun and social engineering
2009-01-07/a>
Bojan Zdrnja
An Israeli patriot program or a trojan
2009-01-02/a>
Rick Wanner
Tools on my Christmas list.
2008-12-13/a>
Jim Clausing
Followup from last shift and some research to do.
2008-11-17/a>
Marcus Sachs
New Tool: NetWitness Investigator
2008-11-17/a>
Jim Clausing
Finding stealth injected DLLs
2008-09-03/a>
Daniel Wesemann
Static analysis of Shellcode - Part 2
2008-07-07/a>
Pedro Bueno
Bad url classification
2006-10-02/a>
Jim Clausing
Reader's tip of the day: ratios vs. raw counts
2006-09-18/a>
Jim Clausing
Log analysis follow up
2006-09-09/a>
Jim Clausing
Log Analysis tips?
2006-09-09/a>
Jim Clausing
A few preliminary log analysis thoughts
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Learn
about the Internet Storm Center
and our
volunteer InfoSec handlers