Internet Storm Center
Sign In
Sign Up
SANS Network Security: Las Vegas Sept 4-9.
Handler on Duty:
Johannes Ullrich
Threat Level:
green
Date
Author
Title
RASPBERRY PI
2022-05-03
Johannes Ullrich
Some Honeypot Updates
2020-06-25
Johannes Ullrich
Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2017-08-03
Johannes Ullrich
Using a Raspberry Pi honeypot to contribute data to DShield/ISC
RASPBERRY
2022-08-30/a>
Johannes Ullrich
Two things that will never die: bash scripts and IRC!
2022-05-03/a>
Johannes Ullrich
Some Honeypot Updates
2020-06-25/a>
Johannes Ullrich
Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2017-08-03/a>
Johannes Ullrich
Using a Raspberry Pi honeypot to contribute data to DShield/ISC
PI
2024-08-29/a>
Xavier Mertens
Live Patching DLLs with Python
2024-08-22/a>
Johannes Ullrich
OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-05-22/a>
Rob VandenBrink
NMAP Scanning without Scanning (Part 2) - The ipinfo API
2024-03-29/a>
Xavier Mertens
Quick Forensics Analysis of Apache logs
2024-03-10/a>
Guy Bruneau
What happens when you accidentally leak your AWS API keys? [Guest Diary]
2023-12-31/a>
Tom Webb
Pi-Hole Pi4 Docker Deployment
2023-12-23/a>
Xavier Mertens
Python Keylogger Using Mailtrap.io
2023-12-15/a>
Xavier Mertens
CSharp Payload Phoning to a CobaltStrike Server
2023-07-21/a>
Rob VandenBrink
Shodan's API For The (Recon) Win!
2023-04-07/a>
Xavier Mertens
Detecting Suspicious API Usage with YARA Rules
2023-03-25/a>
Guy Bruneau
Microsoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>
Didier Stevens
Windows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-02-15/a>
Rob VandenBrink
DNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2022-12-19/a>
Xavier Mertens
Hunting for Mastodon Servers
2022-08-30/a>
Johannes Ullrich
Two things that will never die: bash scripts and IRC!
2022-06-21/a>
Johannes Ullrich
Experimental New Domain / Domain Age API
2022-05-24/a>
Yee Ching Tok
ctx Python Library Updated with "Extra" Features
2022-05-03/a>
Johannes Ullrich
Some Honeypot Updates
2022-03-18/a>
Johannes Ullrich
Scans for Movable Type Vulnerability (CVE-2021-20837)
2022-03-10/a>
Xavier Mertens
Credentials Leaks on VirusTotal
2022-02-25/a>
Didier Stevens
Windows, Fixed IPv4 Addresses and APIPA
2022-01-21/a>
Xavier Mertens
Obscure Wininet.dll Feature?
2021-12-17/a>
Rob VandenBrink
DR Automation - Using Public DNS APIs
2021-09-09/a>
Johannes Ullrich
Updates to Our Datafeeds/API
2021-08-04/a>
Yee Ching Tok
Pivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-07-24/a>
Xavier Mertens
Agent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-06-19/a>
Xavier Mertens
Easy Access to the NIST RDS Database
2021-06-11/a>
Xavier Mertens
Keeping an Eye on Dangerous Python Modules
2021-06-09/a>
Jan Kopriva
Architecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files"
2021-05-08/a>
Guy Bruneau
Who is Probing the Internet for Research Purposes?
2021-05-06/a>
Xavier Mertens
Alternative Ways To Perform Basic Tasks
2021-03-17/a>
Xavier Mertens
Defenders, Know Your Operating System Like Attackers Do!
2021-03-11/a>
Johannes Ullrich
Piktochart - Phishing with Infographics
2021-01-07/a>
Rob VandenBrink
Using the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3)
2020-12-22/a>
Xavier Mertens
Malware Victim Selection Through WiFi Identification
2020-12-05/a>
Guy Bruneau
Is IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-09-02/a>
Xavier Mertens
Python and Risky Windows API Calls
2020-08-18/a>
Xavier Mertens
Using API's to Track Attackers
2020-07-28/a>
Johannes Ullrich
All I want this Tuesday: More Data
2020-06-25/a>
Johannes Ullrich
Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-20/a>
Tom Webb
Pi Zero HoneyPot
2020-05-29/a>
Johannes Ullrich
The Impact of Researchers on Our Data
2020-05-21/a>
Xavier Mertens
Malware Triage with FLOSS: API Calls Based Behavior
2020-03-31/a>
Johannes Ullrich
Kwampirs Targeted Attacks Involving Healthcare Sector
2020-02-29/a>
Guy Bruneau
Hazelcast IMDG Discover Scan
2020-02-17/a>
Didier Stevens
curl and SSPI
2020-01-16/a>
Bojan Zdrnja
Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability
2019-12-29/a>
Guy Bruneau
ELK Dashboard for Pihole Logs
2019-12-07/a>
Guy Bruneau
Integrating Pi-hole Logs in ELK with Logstash
2019-11-25/a>
Xavier Mertens
My Little DoH Setup
2019-08-28/a>
Xavier Mertens
Malware Samples Compiling Their Next Stage on Premise
2019-06-25/a>
Brad Duncan
Rig Exploit Kit sends Pitou.B Trojan
2019-05-16/a>
Xavier Mertens
The Risk of Authenticated Vulnerability Scans
2019-03-15/a>
Remco Verhoef
Binary Analysis with Jupyter and Radare2
2019-02-26/a>
Russ McRee
Ad Blocking With Pi Hole
2019-01-21/a>
Didier Stevens
Suspicious GET Request: Do You Know What This Is?
2019-01-10/a>
Brad Duncan
Heartbreaking Emails: "Love You" Malspam
2018-11-18/a>
Guy Bruneau
Multipurpose PCAP Analysis Tool
2018-11-17/a>
Xavier Mertens
Quickly Investigating Websites with Lookyloo
2018-11-12/a>
Rick Wanner
Using the Neutrino ip-blocklist API to test general badness of an IP
2018-09-05/a>
Xavier Mertens
Malicious PowerShell Compiling C# Code on the Fly
2018-07-21/a>
Didier Stevens
BTC pickpockets are back
2017-11-17/a>
Xavier Mertens
Top-100 Malicious IP STIX Feed
2017-10-06/a>
Johannes Ullrich
What's in a cable? The dangers of unauthorized cables
2017-09-05/a>
Adrien de Beaupre
Struts vulnerability patch released by apache, patch now
2017-08-03/a>
Johannes Ullrich
Using a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-05-10/a>
Johannes Ullrich
Read This If You Are Using a Script to Pull Data From This Site
2017-05-08/a>
Renato Marinho
Exploring a P2P Transient Botnet - From Discovery to Enumeration
2017-01-10/a>
Johannes Ullrich
Port 37777 "MapTable" Requests
2017-01-07/a>
Xavier Mertens
Using Security Tools to Compromize a Network
2016-08-22/a>
Russ McRee
Red Team Tools Updates: hashcat and SpiderFoot
2015-09-03/a>
Xavier Mertens
Querying the DShield API from RTIR
2015-03-26/a>
Daniel Wesemann
Pin-up on your Smartphone!
2014-05-28/a>
Rob VandenBrink
Assessing SOAP APIs with Burp
2014-04-01/a>
Basil Alawi S.Taher
Upgrading Your Android, Elevating My Malware
2014-03-12/a>
Johannes Ullrich
Wordpress "Pingback" DDoS Attacks
2014-02-18/a>
Johannes Ullrich
More Details About "TheMoon" Linksys Worm
2014-02-10/a>
Rob VandenBrink
Isn't it About Time to Get Moving on Chip and PIN?
2014-02-04/a>
Johannes Ullrich
Odd ICMP Echo Request Payload
2014-01-20/a>
Rob VandenBrink
You Can Run, but You Can't Hide (SSH and other open services)
2013-12-19/a>
Rob VandenBrink
Target US - Credit Card Data Breach
2013-12-12/a>
Basil Alawi S.Taher
Acquiring Memory Images with Dumpit
2013-12-01/a>
Richard Porter
BPF, PCAP, Binary, hex, why they matter?
2013-11-04/a>
Manuel Humberto Santander Pelaez
When attackers use your DNS to check for the sites you are visiting
2013-10-25/a>
Rob VandenBrink
Kaspersky flags TCPIP.SYS as Malware
2013-03-27/a>
Adam Swanger
IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-02-25/a>
Johannes Ullrich
Punkspider enumerates web application vulnerabilities
2013-02-22/a>
Johannes Ullrich
Zendesk breach affects Tumblr/Pinterest/Twitter
2012-11-26/a>
John Bambenek
Online Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-16/a>
Guy Bruneau
VMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-07-21/a>
Rick Wanner
TippingPoint DNS Version Request increase
2012-06-25/a>
Rick Wanner
Targeted Malware for Industrial Espionage?
2011-12-07/a>
Lenny Zeltser
V8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-09-29/a>
Daniel Wesemann
The SSD dilemma
2011-08-13/a>
Rick Wanner
MoonSols Dumpit released...for free!
2011-08-08/a>
Rob VandenBrink
Ping is Bad (Sometimes)
2011-06-09/a>
Richard Porter
One Browser to Rule them All?
2011-05-01/a>
Deborah Hale
Another Potentially Malicious Email Making The Rounds
2011-02-08/a>
Johannes Ullrich
Tippingpoint Releases Details on Unpatched Bugs
2010-12-25/a>
Manuel Humberto Santander Pelaez
An interesting vulnerability playground to learn application vulnerabilities
2010-12-02/a>
Kevin Johnson
Robert Hansen and our happiness
2010-11-18/a>
Chris Carboni
All of your pages are belonging to us
2010-07-21/a>
Adrien de Beaupre
Update on .LNK vulnerability
2010-07-08/a>
Kyle Haugsness
Pirate Bay account database compromised
2010-06-29/a>
Johannes Ullrich
How to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-14/a>
Manuel Humberto Santander Pelaez
Another way to get protection for application-level attacks
2010-03-30/a>
Pedro Bueno
Sharing the Tools
2010-02-10/a>
Johannes Ullrich
Twitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-01-25/a>
William Salusky
"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2009-08-21/a>
Rick Wanner
Interesting malware...affecting the Delphi Compiler?
2009-03-10/a>
Swa Frantzen
conspiracy fodder: pifts.exe
2008-10-01/a>
Rick Wanner
Handler Mailbag
2008-07-14/a>
Daniel Wesemann
Obfuscated JavaScript Redux
2008-06-18/a>
Marcus Sachs
Olympics Part II
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Subscribe to the Internet Storm Center
YouTube Channel