Threat Level: green Handler on Duty: Rick Wanner

SANS ISC: Diaries by Keyword - SANS Internet Storm Center Diaries by Keyword


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Date Author Title

FILE INTEGRITY MONITORING

2016-03-30Xavier MertensWhat to watch with your FIM?

FILE

2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2018-11-05/a>Johannes UllrichStruts 2.3 Vulnerable to Two Year old File Upload Flaw
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-10-30/a>Didier StevensPE files and debug info
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-07-02/a>Didier StevensPE Section Name Descriptions
2017-05-26/a>Lorna HutchesonFile2pcap - A new tool for your toolkit!
2016-08-24/a>Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-02-28/a>Daniel WesemannOversharing
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2011-11-28/a>Tom ListonA Puzzlement...
2011-08-15/a>Mark HofmanHow to find unwanted files on workstations
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-08-13/a>Jim ClausingTools for extracting files from pcaps
2009-06-27/a>Tony CarothersNew NIAP Strategy on the Horizon
2009-05-27/a>donald smithHost file black lists
2009-05-25/a>Jim ClausingMore tools for (US) Memorial Day
2008-03-13/a>Jason LamRemote File Include spoof!?

INTEGRITY

2017-07-12/a>Xavier MertensBackup Scripts, the FIM of the Poor
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2010-03-18/a>Bojan ZdrnjaDangers of copy&paste

MONITORING

2019-01-31/a>Xavier MertensTracking Unexpected DNS Changes
2017-06-17/a>Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2017-03-15/a>Xavier MertensRetro Hunting!
2016-05-18/a>Russ McReeResources: Windows Auditing & Monitoring, Linux 2FA
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2015-12-12/a>Russell EubanksWhat Signs Are You Missing?
2013-03-06/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - Geolocation Using IPv6 Addresses
2012-09-02/a>Lorna HutchesonDemonstrating the value of your Intrusion Detection Program and Analysts
2012-08-30/a>Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-23/a>Bojan ZdrnjaAnalyzing outgoing network traffic
2011-10-17/a>Rob VandenBrinkCritical Control 11: Account Monitoring and Control