RASPBERRY PI |
2022-05-03 | Johannes Ullrich | Some Honeypot Updates |
2020-06-25 | Johannes Ullrich | Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release. |
2017-08-03 | Johannes Ullrich | Using a Raspberry Pi honeypot to contribute data to DShield/ISC |
RASPBERRY |
2022-08-30/a> | Johannes Ullrich | Two things that will never die: bash scripts and IRC! |
2022-05-03/a> | Johannes Ullrich | Some Honeypot Updates |
2020-06-25/a> | Johannes Ullrich | Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release. |
2017-08-03/a> | Johannes Ullrich | Using a Raspberry Pi honeypot to contribute data to DShield/ISC |
PI |
2025-03-10/a> | Xavier Mertens | Shellcode Encoded in UUIDs |
2024-08-29/a> | Xavier Mertens | Live Patching DLLs with Python |
2024-08-22/a> | Johannes Ullrich | OpenAI Scans for Honeypots. Artificially Malicious? Action Abuse? |
2024-05-22/a> | Rob VandenBrink | NMAP Scanning without Scanning (Part 2) - The ipinfo API |
2024-03-29/a> | Xavier Mertens | Quick Forensics Analysis of Apache logs |
2024-03-10/a> | Guy Bruneau | What happens when you accidentally leak your AWS API keys? [Guest Diary] |
2023-12-31/a> | Tom Webb | Pi-Hole Pi4 Docker Deployment |
2023-12-23/a> | Xavier Mertens | Python Keylogger Using Mailtrap.io |
2023-12-15/a> | Xavier Mertens | CSharp Payload Phoning to a CobaltStrike Server |
2023-07-21/a> | Rob VandenBrink | Shodan's API For The (Recon) Win! |
2023-04-07/a> | Xavier Mertens | Detecting Suspicious API Usage with YARA Rules |
2023-03-25/a> | Guy Bruneau | Microsoft Released an Update for Windows Snipping Tool Vulnerability |
2023-03-22/a> | Didier Stevens | Windows 11 Snipping Tool Privacy Bug: Inspecting PNG Files |
2023-02-15/a> | Rob VandenBrink | DNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer |
2022-12-19/a> | Xavier Mertens | Hunting for Mastodon Servers |
2022-08-30/a> | Johannes Ullrich | Two things that will never die: bash scripts and IRC! |
2022-06-21/a> | Johannes Ullrich | Experimental New Domain / Domain Age API |
2022-05-24/a> | Yee Ching Tok | ctx Python Library Updated with "Extra" Features |
2022-05-03/a> | Johannes Ullrich | Some Honeypot Updates |
2022-03-18/a> | Johannes Ullrich | Scans for Movable Type Vulnerability (CVE-2021-20837) |
2022-03-10/a> | Xavier Mertens | Credentials Leaks on VirusTotal |
2022-02-25/a> | Didier Stevens | Windows, Fixed IPv4 Addresses and APIPA |
2022-01-21/a> | Xavier Mertens | Obscure Wininet.dll Feature? |
2021-12-17/a> | Rob VandenBrink | DR Automation - Using Public DNS APIs |
2021-09-09/a> | Johannes Ullrich | Updates to Our Datafeeds/API |
2021-08-04/a> | Yee Ching Tok | Pivoting and Hunting for Shenanigans from a Reported Phishing Domain |
2021-07-24/a> | Xavier Mertens | Agent.Tesla Dropped via a .daa Image and Talking to Telegram |
2021-06-19/a> | Xavier Mertens | Easy Access to the NIST RDS Database |
2021-06-11/a> | Xavier Mertens | Keeping an Eye on Dangerous Python Modules |
2021-06-09/a> | Jan Kopriva | Architecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files" |
2021-05-08/a> | Guy Bruneau | Who is Probing the Internet for Research Purposes? |
2021-05-06/a> | Xavier Mertens | Alternative Ways To Perform Basic Tasks |
2021-03-17/a> | Xavier Mertens | Defenders, Know Your Operating System Like Attackers Do! |
2021-03-11/a> | Johannes Ullrich | Piktochart - Phishing with Infographics |
2021-01-07/a> | Rob VandenBrink | Using the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3) |
2020-12-22/a> | Xavier Mertens | Malware Victim Selection Through WiFi Identification |
2020-12-05/a> | Guy Bruneau | Is IP 91.199.118.137 testing Access to aahwwx.52host.xyz? |
2020-09-02/a> | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-18/a> | Xavier Mertens | Using API's to Track Attackers |
2020-07-28/a> | Johannes Ullrich | All I want this Tuesday: More Data |
2020-06-25/a> | Johannes Ullrich | Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release. |
2020-06-20/a> | Tom Webb | Pi Zero HoneyPot |
2020-05-29/a> | Johannes Ullrich | The Impact of Researchers on Our Data |
2020-05-21/a> | Xavier Mertens | Malware Triage with FLOSS: API Calls Based Behavior |
2020-03-31/a> | Johannes Ullrich | Kwampirs Targeted Attacks Involving Healthcare Sector |
2020-02-29/a> | Guy Bruneau | Hazelcast IMDG Discover Scan |
2020-02-17/a> | Didier Stevens | curl and SSPI |
2020-01-16/a> | Bojan Zdrnja | Summing up CVE-2020-0601, or the Let?s Decrypt vulnerability |
2019-12-29/a> | Guy Bruneau | ELK Dashboard for Pihole Logs |
2019-12-07/a> | Guy Bruneau | Integrating Pi-hole Logs in ELK with Logstash |
2019-11-25/a> | Xavier Mertens | My Little DoH Setup |
2019-08-28/a> | Xavier Mertens | Malware Samples Compiling Their Next Stage on Premise |
2019-06-25/a> | Brad Duncan | Rig Exploit Kit sends Pitou.B Trojan |
2019-05-16/a> | Xavier Mertens | The Risk of Authenticated Vulnerability Scans |
2019-03-15/a> | Remco Verhoef | Binary Analysis with Jupyter and Radare2 |
2019-02-26/a> | Russ McRee | Ad Blocking With Pi Hole |
2019-01-21/a> | Didier Stevens | Suspicious GET Request: Do You Know What This Is? |
2019-01-10/a> | Brad Duncan | Heartbreaking Emails: "Love You" Malspam |
2018-11-18/a> | Guy Bruneau | Multipurpose PCAP Analysis Tool |
2018-11-17/a> | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-11-12/a> | Rick Wanner | Using the Neutrino ip-blocklist API to test general badness of an IP |
2018-09-05/a> | Xavier Mertens | Malicious PowerShell Compiling C# Code on the Fly |
2018-07-21/a> | Didier Stevens | BTC pickpockets are back |
2017-11-17/a> | Xavier Mertens | Top-100 Malicious IP STIX Feed |
2017-10-06/a> | Johannes Ullrich | What's in a cable? The dangers of unauthorized cables |
2017-09-05/a> | Adrien de Beaupre | Struts vulnerability patch released by apache, patch now |
2017-08-03/a> | Johannes Ullrich | Using a Raspberry Pi honeypot to contribute data to DShield/ISC |
2017-05-10/a> | Johannes Ullrich | Read This If You Are Using a Script to Pull Data From This Site |
2017-05-08/a> | Renato Marinho | Exploring a P2P Transient Botnet - From Discovery to Enumeration |
2017-01-10/a> | Johannes Ullrich | Port 37777 "MapTable" Requests |
2017-01-07/a> | Xavier Mertens | Using Security Tools to Compromize a Network |
2016-08-22/a> | Russ McRee | Red Team Tools Updates: hashcat and SpiderFoot |
2015-09-03/a> | Xavier Mertens | Querying the DShield API from RTIR |
2015-03-26/a> | Daniel Wesemann | Pin-up on your Smartphone! |
2014-05-28/a> | Rob VandenBrink | Assessing SOAP APIs with Burp |
2014-04-01/a> | Basil Alawi S.Taher | Upgrading Your Android, Elevating My Malware |
2014-03-12/a> | Johannes Ullrich | Wordpress "Pingback" DDoS Attacks |
2014-02-18/a> | Johannes Ullrich | More Details About "TheMoon" Linksys Worm |
2014-02-10/a> | Rob VandenBrink | Isn't it About Time to Get Moving on Chip and PIN? |
2014-02-04/a> | Johannes Ullrich | Odd ICMP Echo Request Payload |
2014-01-20/a> | Rob VandenBrink | You Can Run, but You Can't Hide (SSH and other open services) |
2013-12-19/a> | Rob VandenBrink | Target US - Credit Card Data Breach |
2013-12-12/a> | Basil Alawi S.Taher | Acquiring Memory Images with Dumpit |
2013-12-01/a> | Richard Porter | BPF, PCAP, Binary, hex, why they matter? |
2013-11-04/a> | Manuel Humberto Santander Pelaez | When attackers use your DNS to check for the sites you are visiting |
2013-10-25/a> | Rob VandenBrink | Kaspersky flags TCPIP.SYS as Malware |
2013-03-27/a> | Adam Swanger | IPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-22/a> | Johannes Ullrich | Zendesk breach affects Tumblr/Pinterest/Twitter |
2012-11-26/a> | John Bambenek | Online Shopping for the Holidays? Tips, News and a Fair Warning |
2012-11-16/a> | Guy Bruneau | VMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html |
2012-07-21/a> | Rick Wanner | TippingPoint DNS Version Request increase |
2012-06-25/a> | Rick Wanner | Targeted Malware for Industrial Espionage? |
2011-12-07/a> | Lenny Zeltser | V8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation |
2011-09-29/a> | Daniel Wesemann | The SSD dilemma |
2011-08-13/a> | Rick Wanner | MoonSols Dumpit released...for free! |
2011-08-08/a> | Rob VandenBrink | Ping is Bad (Sometimes) |
2011-06-09/a> | Richard Porter | One Browser to Rule them All? |
2011-05-01/a> | Deborah Hale | Another Potentially Malicious Email Making The Rounds |
2011-02-08/a> | Johannes Ullrich | Tippingpoint Releases Details on Unpatched Bugs |
2010-12-25/a> | Manuel Humberto Santander Pelaez | An interesting vulnerability playground to learn application vulnerabilities |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-11-18/a> | Chris Carboni | All of your pages are belonging to us |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-07-08/a> | Kyle Haugsness | Pirate Bay account database compromised |
2010-06-29/a> | Johannes Ullrich | How to be a better spy: Cyber security lessons from the recent russian spy arrests |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-03-30/a> | Pedro Bueno | Sharing the Tools |
2010-02-10/a> | Johannes Ullrich | Twitpic, EXIF and GPS: I Know Where You Did it Last Summer |
2010-01-25/a> | William Salusky | "Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!" |
2009-08-21/a> | Rick Wanner | Interesting malware...affecting the Delphi Compiler? |
2009-03-10/a> | Swa Frantzen | conspiracy fodder: pifts.exe |
2008-10-01/a> | Rick Wanner | Handler Mailbag |
2008-07-14/a> | Daniel Wesemann | Obfuscated JavaScript Redux |
2008-06-18/a> | Marcus Sachs | Olympics Part II |