Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Didier Stevens
Threat Level:
green
Date
Author
Title
COMMAND LINE
2018-07-30
Xavier Mertens
Exploiting the Power of Curl
2018-05-02
Russ McRee
Windows Commands Reference - An InfoSec Must Have
2016-04-15
Xavier Mertens
Windows Command Line Persistence?
2010-01-27
Raul Siles
Command Line Kung Fu
COMMAND
2024-07-10/a>
Jesse La Grew
Finding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-29/a>
Johannes Ullrich
D-Link NAS Device Backdoor Abused
2023-06-11/a>
Guy Bruneau
DShield Honeypot Activity for May 2023
2021-02-13/a>
Guy Bruneau
vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-05/a>
Xavier Mertens
VBA Macro Trying to Alter the Application Menus
2020-02-14/a>
Xavier Mertens
Keep an Eye on Command-Line Browsers
2019-07-16/a>
Russ McRee
Commando VM: The Complete Mandiant Offensive VM
2018-07-30/a>
Xavier Mertens
Exploiting the Power of Curl
2018-05-02/a>
Russ McRee
Windows Commands Reference - An InfoSec Must Have
2016-07-26/a>
Johannes Ullrich
Command and Control Channels Using "AAAA" DNS Records
2016-04-15/a>
Xavier Mertens
Windows Command Line Persistence?
2015-10-12/a>
Guy Bruneau
Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2013-02-17/a>
Guy Bruneau
HP ArcSight Connector Appliance and Logger Vulnerabilities
2010-02-06/a>
Guy Bruneau
LANDesk Management Gateway Vulnerability
2010-01-27/a>
Raul Siles
Command Line Kung Fu
LINE
2024-08-26/a>
Xavier Mertens
From Highly Obfuscated Batch File to XWorm and Redline
2024-08-14/a>
Xavier Mertens
Multiple Malware Dropped Through MSI Package
2023-11-15/a>
Xavier Mertens
Redline Dropped Through MSIX Package
2022-09-15/a>
Xavier Mertens
Malicious Word Document with a Frameset
2022-07-25/a>
Xavier Mertens
PowerShell Script with Fileless Capability
2022-01-20/a>
Xavier Mertens
RedLine Stealer Delivered Through FTP
2021-11-10/a>
Xavier Mertens
Shadow IT Makes People More Vulnerable to Phishing
2021-01-02/a>
Guy Bruneau
Protecting Home Office and Enterprise in 2021
2018-07-30/a>
Xavier Mertens
Exploiting the Power of Curl
2018-05-02/a>
Russ McRee
Windows Commands Reference - An InfoSec Must Have
2017-12-14/a>
Russ McRee
Security Planner: Improve your online safety
2017-10-18/a>
Renato Marinho
Baselining Servers to Detect Outliers
2017-07-24/a>
Russell Eubanks
Trends Over Time
2016-10-08/a>
Russell Eubanks
Unauthorized Change Detected!
2016-04-15/a>
Xavier Mertens
Windows Command Line Persistence?
2014-09-27/a>
Guy Bruneau
What has Bash and Heartbleed Taught Us?
2012-11-26/a>
John Bambenek
Online Shopping for the Holidays? Tips, News and a Fair Warning
2012-06-22/a>
Kevin Liston
Investigator's Tool-kit: Timeline
2010-10-04/a>
Mark Hofman
Online Voting
2010-06-07/a>
Manuel Humberto Santander Pelaez
Software Restriction Policy to keep malware away
2010-01-27/a>
Raul Siles
Command Line Kung Fu
2010-01-08/a>
Rob VandenBrink
Microsoft OfficeOnline, Searching for Trust and Malware
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
This site is powered by
your submissions
, so tell us
what you see happening