Date Author Title

SCANNING WEBAPP BOTNET

2011-02-28Deborah HalePossible Botnet Scanning

SCANNING

2024-03-06/a>Bojan ZdrnjaScanning and abusing the QUIC protocol
2023-09-23/a>Guy BruneauScanning for Laravel - a PHP Framework for Web Artisants
2023-08-20/a>Guy BruneauSystemBC Malware Activity
2022-08-26/a>Guy BruneauHTTP/2 Packet Analysis with Wireshark
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-08-13/a>Guy BruneauScanning for Microsoft Exchange eDiscovery
2021-07-10/a>Guy BruneauScanning for Microsoft Secure Socket Tunneling Protocol
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-10-24/a>Guy BruneauAn Alternative to Shodan, Censys with User-Agent CensysInspect/1.1
2020-10-03/a>Guy BruneauScanning for SOHO Routers
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-06-13/a>Guy BruneauMirai Botnet Activity
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2020-04-07/a>Johannes UllrichIncrease in RDP Scanning
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2017-11-13/a>Guy Bruneaujsonrpc Scanning for root account
2017-04-22/a>Jim ClausingWTF tcp port 81
2016-02-02/a>Johannes UllrichTargeted IPv6 Scans Using pool.ntp.org .
2014-09-19/a>Guy BruneauWeb Scan looking for /info/whitelist.pac
2014-02-15/a>Rob VandenBrinkMore on HNAP - What is it, How to Use it, How to Find it
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2013-12-19/a>Rob VandenBrinkPassive Scanning Two Ways - How-Tos for the Holidays
2013-12-09/a>Rob VandenBrinkScanning without Scanning
2013-10-17/a>Adrien de BeaupreInternet wide DNS scanning
2013-08-19/a>Rob VandenBrinkZMAP 1.02 released
2012-11-30/a>Daniel WesemannNmap 6.25 released - lots of new goodies, see http://nmap.org/changelog.html
2012-06-27/a>Daniel WesemannWhat's up with port 79 ?
2011-07-17/a>Mark HofmanSSH Brute Force
2011-02-28/a>Deborah HalePossible Botnet Scanning
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-02-01/a>Rob VandenBrinkNMAP 5.21 - Is UDP Protocol Specific Scanning Important? Why Should I Care?
2010-01-09/a>G. N. WhiteWhat's Up With All The Port Scanning Using TCP/6000 As A Source Port?
2009-06-26/a>Mark HofmanPHPMYADMIN scans
2009-06-24/a>Kyle HaugsnessTCP scanning increase for 4899
2009-02-01/a>Chris CarboniScanning for Trixbox vulnerabilities

WEBAPP

2019-08-28/a>Johannes Ullrich[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2013-06-10/a>Johannes UllrichWhen Google isn't Google
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2011-02-28/a>Deborah HalePossible Botnet Scanning
2010-03-21/a>Scott FendleySkipfish - Web Application Security Tool
2010-02-03/a>Johannes UllrichAnatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/
2010-01-25/a>William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)

BOTNET

2024-02-18/a>Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-01-07/a>Guy BruneauSuspicious Prometei Botnet Activity
2023-12-27/a>Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-11-27/a>Guy BruneauDecoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-22/a>Guy BruneauCVE-2023-1389: A New Means to Expand Botnets
2023-11-09/a>Guy BruneauRouters Targeted for Gafgyt Botnet [Guest Diary]
2023-03-11/a>Xavier MertensOverview of a Mirai Payload Generator
2022-02-15/a>Xavier MertensWho Are Those Bots?
2021-11-26/a>Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-10-04/a>Johannes UllrichBoutique "Dark" Botnet Hunting for Crumbs
2020-06-13/a>Guy BruneauMirai Botnet Activity
2019-08-14/a>Brad DuncanRecent example of MedusaHTTP malware
2019-07-26/a>Kevin ShorttDVRIP Port 34567 - Uptick
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2017-05-08/a>Renato MarinhoExploring a P2P Transient Botnet - From Discovery to Enumeration
2016-12-07/a>Xavier MertensThe Passwords You Should Never Use
2016-09-10/a>Xavier MertensOngoing IMAP Scan, Anyone Else?
2016-07-27/a>Xavier MertensAnalyze of a Linux botnet client source code
2014-10-09/a>Johannes UllrichCSAM: My servers started speaking IRC, and that is when I started to listen!
2014-01-16/a>Kevin ShorttPort 4028 - Interesting Activity
2013-12-07/a>Guy BruneauSuspected Active Rovnix Botnet Controller
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-01-11/a>Kevin ShorttSpam Cannons on Holiday
2010-07-29/a>Rob VandenBrinkFBI, Slovenian and Spanish Police announce more arrests of Mariposa Botnet Creator, Operators
2010-04-23/a>Adrien de BeaupreShadowserver botnet rules
2009-12-21/a>Marcus SachsiPhone Botnet Analysis
2009-11-13/a>Deborah HalePushdo/Cutwail Spambot - A Little Known BIG Problem
2009-11-08/a>Kevin ListonFireEye takes on Ozdok and Recovery Ideas
2009-10-10/a>Tony CarothersUser Notification for Possible Infected Systems
2009-09-16/a>Raul SilesIETF Draft for Remediation of Bots in ISP Networks
2009-05-07/a>Deborah HaleBotnet hijacking reveals 70GB of stolen data
2008-09-01/a>John BambenekThe Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
2008-07-19/a>William SaluskyA twist in fluxnet operations. Enter Hydraflux
2008-07-15/a>Maarten Van HorenbeeckBot controller mimicry
2008-04-07/a>John BambenekGot Kraken?
2008-04-07/a>John BambenekKraken Technical Details: UPDATED x3
2006-08-31/a>Swa FrantzenNT botnet submitted
2006-08-31/a>Joel EslerMS06-040 Worm