RETRO HUNTING |
2017-03-15 | Xavier Mertens | Retro Hunting! |
RETRO |
2017-09-02/a> | Xavier Mertens | AutoIT based malware back in the wild |
2017-03-15/a> | Xavier Mertens | Retro Hunting! |
HUNTING |
2025-04-16/a> | Guy Bruneau | RedTail, Remnux and Malware Management [Guest Diary] |
2025-02-20/a> | Guy Bruneau | Using ES|QL in Kibana to Queries DShield Honeypot Logs |
2024-10-03/a> | Guy Bruneau | Kickstart Your DShield Honeypot [Guest Diary] |
2024-09-25/a> | Guy Bruneau | OSINT - Image Analysis or More Where, When, and Metadata [Guest Diary] |
2024-09-11/a> | Guy Bruneau | Hygiene, Hygiene, Hygiene! [Guest Diary] |
2024-09-04/a> | Guy Bruneau | Attack Surface [Guest Diary] |
2024-08-27/a> | Guy Bruneau | Vega-Lite with Kibana to Parse and Display IP Activity over Time |
2024-08-20/a> | Guy Bruneau | Mapping Threats with DNSTwist and the Internet Storm Center [Guest Diary] |
2024-08-07/a> | Guy Bruneau | Same Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary] |
2024-07-16/a> | Guy Bruneau | Who You Gonna Call? AndroxGh0st Busters! [Guest Diary] |
2024-06-26/a> | Guy Bruneau | What Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary] |
2024-06-13/a> | Guy Bruneau | The Art of JQ and Command-line Fu [Guest Diary] |
2024-05-28/a> | Guy Bruneau | Is that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary] |
2024-05-22/a> | Guy Bruneau | Analysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary] |
2024-04-07/a> | Guy Bruneau | A Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary] |
2022-12-20/a> | Xavier Mertens | Linux File System Monitoring & Actions |
2022-12-19/a> | Xavier Mertens | Hunting for Mastodon Servers |
2021-03-17/a> | Xavier Mertens | Defenders, Know Your Operating System Like Attackers Do! |
2020-08-24/a> | Xavier Mertens | Tracking A Malware Campaign Through VT |
2020-01-25/a> | Guy Bruneau | Is Threat Hunting the new Fad? |
2020-01-21/a> | Russ McRee | DeepBlueCLI: Powershell Threat Hunting |
2019-10-10/a> | Rob VandenBrink | Mining Live Networks for OUI Data Oddness |
2019-07-17/a> | Xavier Mertens | Analyzis of DNS TXT Records |
2019-03-27/a> | Xavier Mertens | Running your Own Passive DNS Service |
2018-11-20/a> | Xavier Mertens | Querying DShield from Cortex |
2018-10-17/a> | Russ McRee | RedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence |
2018-09-20/a> | Xavier Mertens | Hunting for Suspicious Processes with OSSEC |
2018-08-10/a> | Remco Verhoef | Hunting SSL/TLS clients using JA3 |
2018-06-21/a> | Xavier Mertens | Are Your Hunting Rules Still Working? |
2017-12-02/a> | Xavier Mertens | Using Bad Material for the Good |
2017-11-23/a> | Xavier Mertens | Proactive Malicious Domain Search |
2017-10-18/a> | Renato Marinho | Baselining Servers to Detect Outliers |
2017-09-02/a> | Xavier Mertens | AutoIT based malware back in the wild |
2017-03-15/a> | Xavier Mertens | Retro Hunting! |
2016-07-12/a> | Xavier Mertens | Hunting for Malicious Files with MISP + OSSEC |