WEB HONEYPOT VOLUNTEER |
2008-12-01 | Jason Lam | Call for volunteers - Web Honeypot Project |
WEB |
2025-03-09/a> | Johannes Ullrich | Commonly Probed Webshell URLs |
2025-02-26/a> | Jesse La Grew | [Guest Diary] Malware Source Servers: The Threat of Attackers Using Ephemeral Ports as Service Ports to Upload Data |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-11-06/a> | Jesse La Grew | [Guest Diary] Insights from August Web Traffic Surge |
2024-01-22/a> | Johannes Ullrich | Apple Updates Everything - New 0 Day in WebKit |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-05-03/a> | Xavier Mertens | Increased Number of Configuration File Scans |
2023-04-18/a> | Johannes Ullrich | UDDIs are back? Attackers rediscovering old exploits. |
2023-02-25/a> | Didier Stevens | Crypto Inside a Browser |
2023-02-24/a> | Brad Duncan | URL files and WebDAV used for IcedID (Bokbot) infection |
2022-09-21/a> | Xavier Mertens | Phishing Campaigns Use Free Online Resources |
2022-08-23/a> | Xavier Mertens | Who's Looking at Your security.txt File? |
2022-08-17/a> | Johannes Ullrich | Apple Patches Two Exploited Vulnerabilities |
2022-08-01/a> | Johannes Ullrich | A Little DDoS In the Morning |
2022-04-05/a> | Johannes Ullrich | WebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools |
2022-03-11/a> | Xavier Mertens | Keep an Eye on WebSockets |
2022-02-07/a> | Johannes Ullrich | web3 phishing via self-customizing landing pages |
2021-12-07/a> | Johannes Ullrich | Webshells, Webshells everywhere! |
2021-12-01/a> | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-10-11/a> | Johannes Ullrich | Things that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers |
2021-10-09/a> | Guy Bruneau | Scanning for Previous Oracle WebLogic Vulnerabilities |
2021-06-24/a> | Xavier Mertens | Do you Like Cookies? Some are for sale! |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2020-11-07/a> | Guy Bruneau | Cryptojacking Targeting WebLogic TCP/7001 |
2020-10-29/a> | Johannes Ullrich | PATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots |
2020-08-10/a> | Bojan Zdrnja | Scoping web application and web service penetration tests |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-09-24/a> | Xavier Mertens | Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs |
2019-08-28/a> | Johannes Ullrich | [Guest Diary] Open Redirect: A Small But Very Common Vulnerability |
2019-08-01/a> | Johannes Ullrich | What is Listening On Port 9527/TCP? |
2019-06-19/a> | Johannes Ullrich | Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729 |
2019-04-28/a> | Johannes Ullrich | Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status) |
2019-04-25/a> | Rob VandenBrink | Unpatched Vulnerability Alert - WebLogic Zero Day |
2019-02-02/a> | Guy Bruneau | Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269 |
2018-11-17/a> | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-07-20/a> | Kevin Liston | Weblogic Exploit Code Made Public (CVE-2018-2893) |
2018-05-03/a> | Renato Marinho | WebLogic Exploited in the Wild (Again) |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2017-09-14/a> | Xavier Mertens | Another webshell, another backdoor! |
2017-07-19/a> | Xavier Mertens | Bots Searching for Keys & Config Files |
2017-06-01/a> | Xavier Mertens | Sharing Private Data with Webcast Invitations |
2017-05-12/a> | Xavier Mertens | When Bad Guys are Pwning Bad Guys... |
2017-04-07/a> | Xavier Mertens | Tracking Website Defacers with HTTP Referers |
2017-04-02/a> | Guy Bruneau | IPFire - A Household Multipurpose Security Gateway |
2017-02-28/a> | Xavier Mertens | Analysis of a Simple PHP Backdoor |
2017-01-24/a> | Johannes Ullrich | Critical Vulnerability in Cisco WebEx Chrome Plugin |
2017-01-14/a> | Xavier Mertens | Backup Files Are Good but Can Be Evil |
2016-07-13/a> | Xavier Mertens | The Power of Web Shells |
2016-01-29/a> | Xavier Mertens | Scripting Web Categorization |
2015-06-25/a> | Bojan Zdrnja | Web security subtleties and exploitation of combined vulnerabilities |
2015-04-23/a> | Bojan Zdrnja | When automation does not help |
2015-04-14/a> | Johannes Ullrich | Odd POST Request To Web Honeypot |
2014-08-16/a> | Lenny Zeltser | Web Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-06-11/a> | Daniel Wesemann | Gimme your keys! |
2014-06-10/a> | Daniel Wesemann | Sampling Bias |
2014-04-24/a> | Rob VandenBrink | Apple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203 |
2014-04-11/a> | Guy Bruneau | Heartbleed Fix Available for Download for Cisco Products |
2014-04-07/a> | Johannes Ullrich | Attack or Bad Link? Your Guess? |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-13/a> | Johannes Ullrich | Special Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650 |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2013-12-24/a> | Daniel Wesemann | Unfriendly crontab additions |
2013-11-02/a> | Rick Wanner | Protecting Your Family's Computers |
2013-10-04/a> | Pedro Bueno | CSAM: WebHosting BruteForce logs |
2013-09-05/a> | Rob VandenBrink | What's Next for IPS? |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-06-25/a> | Bojan Zdrnja | The race for resources |
2013-06-10/a> | Johannes Ullrich | When Google isn't Google |
2013-04-08/a> | Johannes Ullrich | Cleaning Up After the Leak: Hiding exposed web content |
2013-03-26/a> | Daniel Wesemann | How your Webhosting Account is Getting Abused |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-22/a> | Johannes Ullrich | When web sites go bad: bible . org compromise |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2012-10-26/a> | Adam Swanger | Securing the Human Special Webcast - October 30, 2012 |
2012-09-08/a> | Guy Bruneau | Webmin Input Validation Vulnerabilities |
2012-08-13/a> | Rick Wanner | Interesting scan for medical certification information... |
2012-07-23/a> | Johannes Ullrich | Most Anti-Privacy Web Browsing Tool Ever? |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-12-28/a> | Daniel Wesemann | Hash collisions vulnerability in web servers |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-10-12/a> | Adam Swanger | We are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved. |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-05-17/a> | Johannes Ullrich | A Couple Days of Logs: Looking for the Russian Business Network |
2011-05-14/a> | Guy Bruneau | Websense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity |
2011-05-11/a> | Swa Frantzen | Time to disable WebGL ? |
2011-04-10/a> | Raul Siles | Recent security enhancements in web browsers (e.g. Google Chrome) |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2011-02-28/a> | Deborah Hale | Possible Botnet Scanning |
2011-02-01/a> | Lenny Zeltser | The Importance of HTTP Headers When Investigating Malicious Sites |
2010-12-18/a> | Raul Siles | Google Chrome (Stable and Beta) have been updated to 8.0.552.224 for all platforms (Chrome OS too). http://bit.ly/fW04cr |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-11-18/a> | Chris Carboni | All of your pages are belonging to us |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-08-13/a> | Tom Liston | The Strange Case of Doctor Jekyll and Mr. ED |
2010-07-25/a> | Rick Wanner | Updated version of Mandiant's Web Historian |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-07-20/a> | Manuel Humberto Santander Pelaez | LNK vulnerability now with Metasploit module implementing the WebDAV method |
2010-06-23/a> | Scott Fendley | Opera Browser Update |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-04-26/a> | Raul Siles | Vulnerable Sites Database |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-03-24/a> | Johannes Ullrich | ".sys" Directories Delivering Driveby Downloads |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-02-06/a> | Guy Bruneau | Oracle WebLogic Server Security Alert |
2010-02-03/a> | Johannes Ullrich | Anatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/ |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2010-01-25/a> | William Salusky | "Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!" |
2010-01-20/a> | Johannes Ullrich | Weathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com |
2010-01-08/a> | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-12-28/a> | Johannes Ullrich | 8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug) |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-10-09/a> | Rob VandenBrink | THAWTE to discontinue free Email Certificate Services and Web of Trust Service |
2009-09-18/a> | Jason Lam | Results from Webhoneypot project |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-08-18/a> | Deborah Hale | Domain tcpdump.org unavailable |
2009-08-18/a> | Deborah Hale | Website compromises - what's happening? |
2009-08-17/a> | Adrien de Beaupre | YAMWD: Yet Another Mass Web Defacement |
2009-08-01/a> | Deborah Hale | Website Warnings |
2009-07-13/a> | Adrien de Beaupre | Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution |
2009-07-05/a> | Bojan Zdrnja | More on ColdFusion hacks |
2009-06-11/a> | Jason Lam | Dshield Web Honeypot going beta |
2009-05-27/a> | donald smith | WebDAV write-up |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-24/a> | Raul Siles | IIS admins, help finding WebDAV remotely using nmap |
2009-05-21/a> | Adrien de Beaupre | IIS admins, help finding WebDAV |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-05-05/a> | Bojan Zdrnja | Every dot matters |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-08/a> | Raul Siles | Quick Analysis of the 2007 Web Application Security Statistics |
2008-08-19/a> | Johannes Ullrich | A morning stroll through my web logs |
2008-08-15/a> | Jim Clausing | WebEx ActiveX buffer overflow |
2008-06-07/a> | Jim Clausing | Followup to 'How do you monitor your website?' |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2006-09-30/a> | Swa Frantzen | Yellow: WebViewFolderIcon setslice exploit spreading |
HONEYPOT |
2025-03-06/a> | Guy Bruneau | DShield Traffic Analysis using ELK |
2025-02-13/a> | Guy Bruneau | DShield SIEM Docker Updates |
2025-01-16/a> | Jesse La Grew | Extracting Practical Observations from Impractical Datasets |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-12-09/a> | Jesse La Grew | CURLing for Crypto on Honeypots |
2024-11-06/a> | Jesse La Grew | [Guest Diary] Insights from August Web Traffic Surge |
2024-09-13/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 2 |
2024-09-06/a> | Jesse La Grew | Enrichment Data: Keeping it Fresh |
2024-08-16/a> | Jesse La Grew | [Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools |
2024-07-10/a> | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 1 |
2024-04-25/a> | Jesse La Grew | Does it matter if iptables isn't running on my honeypot? |
2024-03-10/a> | Guy Bruneau | What happens when you accidentally leak your AWS API keys? [Guest Diary] |
2024-03-07/a> | Jesse La Grew | [Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting |
2024-03-03/a> | Guy Bruneau | Capturing DShield Packets with a LAN Tap [Guest Diary] |
2024-02-25/a> | Guy Bruneau | Utilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary] |
2024-02-18/a> | Guy Bruneau | Mirai-Mirai On The Wall... [Guest Diary] |
2024-02-03/a> | Guy Bruneau | DShield Sensor Log Collection with Elasticsearch |
2024-01-30/a> | Johannes Ullrich | What did I say to make you stop talking to me? |
2024-01-17/a> | Jesse La Grew | Number Usage in Passwords |
2023-12-27/a> | Guy Bruneau | Unveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary] |
2023-12-13/a> | Guy Bruneau | T-shooting Terraform for DShield Honeypot in Azure [Guest Diary] |
2023-12-10/a> | Guy Bruneau | Honeypots: From the Skeptical Beginner to the Tactical Enthusiast |
2023-11-30/a> | John Bambenek | Prophetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today |
2023-11-27/a> | Guy Bruneau | Decoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary] |
2023-11-20/a> | Jesse La Grew | Overflowing Web Honeypot Logs |
2023-10-15/a> | Guy Bruneau | Domain Name Used as Password Captured by DShield Sensor |
2023-09-14/a> | Jesse La Grew | DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G |
2023-09-09/a> | Guy Bruneau | ?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary] |
2023-09-05/a> | Jesse La Grew | Common usernames submitted to honeypots |
2023-09-02/a> | Jesse La Grew | What is the origin of passwords submitted to honeypots? |
2023-08-31/a> | Guy Bruneau | Potential Weaponizing of Honeypot Logs [Guest Diary] |
2023-08-12/a> | Guy Bruneau | DShield Sensor Monitoring with a Docker ELK Stack [Guest Diary] |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-07-13/a> | Jesse La Grew | DShield Honeypot Maintenance and Data Retention |
2023-07-06/a> | Jesse La Grew | IDS Comparisons with DShield Honeypot Data |
2023-06-11/a> | Guy Bruneau | DShield Honeypot Activity for May 2023 |
2023-05-14/a> | Guy Bruneau | DShield Sensor Update |
2023-04-17/a> | Jan Kopriva | The strange case of Great honeypot of China |
2023-01-31/a> | Jesse La Grew | DShield Honeypot Setup with pfSense |
2022-12-29/a> | Jesse La Grew | Opening the Door for a Knock: Creating a Custom DShield Listener |
2022-12-21/a> | Guy Bruneau | DShield Sensor Setup in Azure |
2022-09-12/a> | Johannes Ullrich | VirusTotal Result Comparisons for Honeypot Malware |
2022-08-18/a> | Johannes Ullrich | Honeypot Attack Summaries with Python |
2022-06-15/a> | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-05-03/a> | Johannes Ullrich | Some Honeypot Updates |
2022-03-31/a> | Johannes Ullrich | Spring Vulnerability Update - Exploitation Attempts CVE-2022-22965 |
2021-01-15/a> | Guy Bruneau | Obfuscated DNS Queries |
2020-12-04/a> | Guy Bruneau | Detecting Actors Activity with Threat Intel |
2020-07-01/a> | Jim Clausing | Setting up the Dshield honeypot and tcp-honeypot.py |
2020-06-28/a> | Guy Bruneau | tcp-honeypot.py Logstash Parser & Dashboard Update |
2020-06-25/a> | Johannes Ullrich | Tech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release. |
2020-06-20/a> | Tom Webb | Pi Zero HoneyPot |
2020-06-05/a> | Remco Verhoef | Not so FastCGI! |
2020-05-01/a> | Jim Clausing | Attack traffic on TCP port 9673 |
2020-01-12/a> | Guy Bruneau | ELK Dashboard and Logstash parser for tcp-honeypot Logs |
2019-11-03/a> | Didier Stevens | You Too? "Unusual Activity with Double Base64 Encoding" |
2018-11-09/a> | Tom Webb | Playing with T-POT |
2018-05-27/a> | Guy Bruneau | Capture and Analysis of User Agents |
2017-08-03/a> | Johannes Ullrich | Using a Raspberry Pi honeypot to contribute data to DShield/ISC |
2017-07-27/a> | Xavier Mertens | TinyPot, My Small Honeypot |
2017-03-12/a> | Guy Bruneau | Honeypot Logs and Tracking a VBE Script |
2017-02-21/a> | Jim Clausing | Quick and dirty generic listener |
2016-12-31/a> | Xavier Mertens | Ongoing Scans Below the Radar |
2016-11-13/a> | Guy Bruneau | Bitcoin Miner File Upload via FTP |
2016-07-07/a> | Johannes Ullrich | Patchwork: Is it still "Advanced" if all you have to do is Copy/Paste? |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2016-05-14/a> | Guy Bruneau | INetSim as a Basic Honeypot |
2016-04-27/a> | Tom Webb | Kippos Cousin Cowrie |
2016-03-15/a> | Xavier Mertens | Dockerized DShield SSH Honeypot |
2016-03-13/a> | Xavier Mertens | SSH Honeypots (Ab)used as Proxy |
2015-04-14/a> | Johannes Ullrich | Odd POST Request To Web Honeypot |
2014-07-31/a> | Chris Mohan | A Honeypot for home: Raspberry Pi |
2014-06-30/a> | Johannes Ullrich | Should I setup a Honeypot? [SANSFIRE] |
2014-05-01/a> | Johannes Ullrich | Busybox Honeypot Fingerprinting and a new DVR scanner |
2013-07-25/a> | Johannes Ullrich | A Couple of SSH Brute Force Compromises |
2013-07-13/a> | Lenny Zeltser | Decoy Personas for Safeguarding Online Identity Using Deception |
2010-11-05/a> | Adrien de Beaupre | Bot honeypot |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-09-18/a> | Jason Lam | Results from Webhoneypot project |
2009-06-11/a> | Jason Lam | Dshield Web Honeypot going beta |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
VOLUNTEER |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
2008-07-07/a> | Jason Lam | We need academic volunteers - Web security research |