RFI REMOTE FILE INCLUDE |
2011-11-28 | Tom Liston | A Puzzlement... |
2008-03-13 | Jason Lam | Remote File Include spoof!? |
RFI |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-09/a> | Bojan Zdrnja | Massive PHP RFI scans |
2012-03-07/a> | Johannes Ullrich | What happened to RFI attacks? |
2011-11-28/a> | Tom Liston | A Puzzlement... |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2008-03-13/a> | Jason Lam | Remote File Include spoof!? |
REMOTE |
2024-06-17/a> | Xavier Mertens | New NetSupport Campaign Delivered Through MSIX Packages |
2022-10-07/a> | Xavier Mertens | Critical Fortinet Vulnerability Ahead |
2021-05-14/a> | Xavier Mertens | "Open" Access to Industrial Systems Interface is Also Far From Zero |
2021-02-13/a> | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2020-09-29/a> | Xavier Mertens | Managing Remote Access for Partners & Contractors |
2020-08-22/a> | Guy Bruneau | Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common? |
2019-09-24/a> | Xavier Mertens | Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs |
2017-11-25/a> | Guy Bruneau | Exim Remote Code Exploit |
2015-10-12/a> | Guy Bruneau | Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 |
2013-09-18/a> | Rob VandenBrink | Cisco DCNM Update Released |
2013-02-16/a> | Lorna Hutcheson | Fedora RedHat Vulnerabilty Released |
2012-08-22/a> | Adrien de Beaupre | Apple Remote Desktop update fixes no encryption issue |
2012-03-16/a> | Russ McRee | MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect |
2011-11-28/a> | Tom Liston | A Puzzlement... |
2011-11-19/a> | Pedro Bueno | Dragon Research Group (DRG) announced the white paper entitled "VNC: Threats and Countermeasures" : https://dragonresearchgroup.org/insight/vnc-tac.html |
2011-08-11/a> | Guy Bruneau | BlackBerry Enterprise Server Critical Update |
2010-12-19/a> | Raul Siles | Intel's new processors have a remote kill switch (Anti-Theft 3.0) |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote Access Tools |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard? |
2010-10-19/a> | Rob VandenBrink | Cyber Security Awareness Month - Day 19 - VPN and Remote Access Tools |
2010-05-12/a> | Rob VandenBrink | Adobe Shockwave Update |
2010-03-15/a> | Adrien de Beaupre | Spamassassin Milter Plugin Remote Root Attack |
2010-03-10/a> | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-02-02/a> | Guy Bruneau | Cisco Secure Desktop Remote XSS Vulnerability |
2009-11-14/a> | Adrien de Beaupre | Microsoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released |
2009-11-12/a> | Rob VandenBrink | Windows 7 / Windows Server 2008 Remote SMB Exploit |
2008-05-06/a> | Marcus Sachs | Industrial Control Systems Vulnerability |
2008-03-13/a> | Jason Lam | Remote File Include spoof!? |
2006-11-20/a> | Joel Esler | MS06-070 Remote Exploit |
FILE |
2025-02-13/a> | Guy Bruneau | DShield SIEM Docker Updates |
2025-01-28/a> | Xavier Mertens | Fileless Python InfoStealer Targeting Exodus |
2024-12-20/a> | Xavier Mertens | Christmas "Gift" Delivered Through SSH |
2024-12-15/a> | Johannes Ullrich | Exploit attempts inspired by recent Struts2 File Upload Vulnerability (CVE-2024-53677, CVE-2023-50164) |
2024-09-16/a> | Xavier Mertens | Managing PE Files With Overlays |
2024-05-31/a> | Xavier Mertens | "K1w1" InfoStealer Uses gofile.io for Exfiltration |
2023-11-20/a> | Jesse La Grew | Overflowing Web Honeypot Logs |
2023-09-29/a> | Xavier Mertens | Are You Still Storing Passwords In Plain Text Files? |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-06-09/a> | Xavier Mertens | Undetected PowerShell Backdoor Disguised as a Profile File |
2023-04-04/a> | Johannes Ullrich | Analyzing the efile.com Malware "efail" |
2023-02-24/a> | Brad Duncan | URL files and WebDAV used for IcedID (Bokbot) infection |
2023-01-21/a> | Guy Bruneau | DShield Sensor JSON Log to Elasticsearch |
2023-01-04/a> | Rob VandenBrink | Update to RTRBK - Diff and File Dates in PowerShell |
2022-12-20/a> | Xavier Mertens | Linux File System Monitoring & Actions |
2022-07-25/a> | Xavier Mertens | PowerShell Script with Fileless Capability |
2022-07-17/a> | Didier Stevens | Python: Files In Use By Another Process |
2022-06-25/a> | Xavier Mertens | Malicious Code Passed to PowerShell via the Clipboard |
2022-06-04/a> | Guy Bruneau | Spam Email Contains a Very Large ISO file |
2022-06-03/a> | Xavier Mertens | Sandbox Evasion... With Just a Filename! |
2022-05-29/a> | Didier Stevens | Extracting The Overlay Of A PE File |
2022-05-28/a> | Didier Stevens | Huge Signed PE File: Keeping The Signature |
2022-05-26/a> | Didier Stevens | Huge Signed PE File |
2022-05-23/a> | Johannes Ullrich | Attacker Scanning for jQuery-File-Upload |
2022-05-20/a> | Xavier Mertens | A 'Zip Bomb' to Bypass Security Controls & Sandboxes |
2022-03-24/a> | Xavier Mertens | Malware Delivered Through Free Sharing Tool |
2021-09-11/a> | Guy Bruneau | Shipping to Elasticsearch Microsoft DNS Logs |
2021-05-02/a> | Didier Stevens | PuTTY And FileZilla Use The Same Fingerprint Registry Keys |
2021-04-10/a> | Guy Bruneau | Building an IDS Sensor with Suricata & Zeek with Logs to ELK |
2021-03-12/a> | Guy Bruneau | Microsoft DHCP Logs Shipped to ELK |
2021-02-12/a> | Xavier Mertens | AgentTesla Dropped Through Automatic Click in Microsoft Help File |
2020-06-12/a> | Xavier Mertens | Malicious Excel Delivering Fileless Payload |
2020-05-22/a> | Didier Stevens | Some Strings to Remember |
2020-05-04/a> | Didier Stevens | Sysmon and File Deletion |
2020-03-21/a> | Guy Bruneau | Honeypot - Scanning and Targeting Devices & Services |
2019-10-03/a> | Xavier Mertens | "Lost_Files" Ransomware |
2019-08-04/a> | Didier Stevens | Detecting ZLIB Compression |
2019-02-19/a> | Didier Stevens | Identifying Files: Failure Happens |
2018-11-05/a> | Johannes Ullrich | Struts 2.3 Vulnerable to Two Year old File Upload Flaw |
2017-11-29/a> | Xavier Mertens | Fileless Malicious PowerShell Sample |
2017-10-30/a> | Didier Stevens | PE files and debug info |
2017-10-24/a> | Xavier Mertens | Stop relying on file extensions |
2017-07-19/a> | Xavier Mertens | Bots Searching for Keys & Config Files |
2017-07-02/a> | Didier Stevens | PE Section Name Descriptions |
2017-05-26/a> | Lorna Hutcheson | File2pcap - A new tool for your toolkit! |
2016-08-24/a> | Xavier Mertens | Example of Targeted Attack Through a Proxy PAC File |
2016-05-21/a> | Didier Stevens | Python Malware - Part 2 |
2016-03-30/a> | Xavier Mertens | What to watch with your FIM? |
2016-01-20/a> | Xavier Mertens | /tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters! |
2015-07-12/a> | Didier Stevens | Jump List Files Are OLE Files |
2014-03-17/a> | Johannes Ullrich | Scans for FCKEditor File Manager |
2014-02-28/a> | Daniel Wesemann | Oversharing |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2013-08-26/a> | Alex Stanford | Stop, Drop and File Carve |
2013-08-21/a> | Alex Stanford | Psst. Your Browser Knows All Your Secrets. |
2011-11-28/a> | Tom Liston | A Puzzlement... |
2011-08-15/a> | Mark Hofman | How to find unwanted files on workstations |
2009-12-28/a> | Johannes Ullrich | 8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug) |
2009-08-13/a> | Jim Clausing | Tools for extracting files from pcaps |
2009-06-27/a> | Tony Carothers | New NIAP Strategy on the Horizon |
2009-05-27/a> | donald smith | Host file black lists |
2009-05-25/a> | Jim Clausing | More tools for (US) Memorial Day |
2008-03-13/a> | Jason Lam | Remote File Include spoof!? |
INCLUDE |
2011-11-28/a> | Tom Liston | A Puzzlement... |
2008-03-13/a> | Jason Lam | Remote File Include spoof!? |