Date Author Title

FIREWALL LOGS TCP 249

2010-02-23Mark HofmanWhat is your firewall telling you and what is TCP249?

FIREWALL

2021-02-15/a>Johannes UllrichSecuring and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2020-09-17/a>Xavier MertensSuspicious Endpoint Containment with OSSEC
2019-11-22/a>Xavier MertensAbusing Web Filters Misconfiguration for Reconnaissance
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-01-22/a>Xavier MertensDNS Firewalling with MISP
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-09-22/a>Didier StevensSuspicious DNS Requests ... Issued by a Firewall
2017-08-23/a>Xavier MertensMalicious script dropping an executable signed by Avast?
2015-02-23/a>Richard PorterSubscribing to the DShield Top 20 on a Palo Alto Networks Firewall
2013-10-18/a>Rob VandenBrinkCSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs?
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-07-20/a>Manuel Humberto Santander PelaezDo you have rogue Internet gateways in your network? Check it with nmap
2013-04-25/a>Adam SwangerGuest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls
2013-03-13/a>Johannes UllrichIPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability
2013-03-08/a>Johannes UllrichIPv6 Focus Month: Filtering ICMPv6 at the Border
2013-03-05/a>Mark HofmanIPv6 Focus Month: Device Defaults
2012-05-17/a>Johannes UllrichDo Firewalls make sense?
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2011-07-15/a>Deborah HaleWhat's in a Firewall?
2010-11-08/a>Manuel Humberto Santander PelaezNetwork Security Perimeter: How to choose the correct firewall and IPS for your environment?
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-05/a>Kyle HaugsnessWhat is your firewall log telling you - responses
2010-03-03/a>Daniel WesemannWhat is your firewall log telling you - Part #2
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2009-10-30/a>Rob VandenBrinkNew version of NIST 800-41, Firewalls and Firewall Policy Guidelines
2009-01-12/a>William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation

LOGS

2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2021-10-11/a>Johannes UllrichThings that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-19/a>Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-06-01/a>Xavier MertensDocker Containers Logging
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-02-14/a>Chris MohanScanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-09/a>Basil Alawi S.TaherMandiant Highlighter 2
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2013-12-03/a>Rob VandenBrinkEven in the Quietest Moments ...
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-11/a>Rick WannerExcellent Security Education Resources
2012-05-02/a>Bojan ZdrnjaMonitoring VMWare logs
2012-04-08/a>Chris MohanBlog Log: More noise or a rich source of intelligence?
2011-11-19/a>Kevin ListonMonitoring your Log Monitoring Process
2011-06-21/a>Chris MohanAustralian government security audit report shows tough love to agencies
2011-06-20/a>Chris MohanLog files - are you reviewing yours?
2011-05-17/a>Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2010-12-24/a>Daniel WesemannA question of class
2010-04-06/a>Daniel WesemannApplication Logs
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-01-09/a>Johannes UllrichSANS Log Management Survey
2008-08-19/a>Johannes UllrichA morning stroll through my web logs
2008-08-05/a>Daniel WesemannWatching those DNS logs
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts

TCP

2023-11-16/a>Johannes UllrichBeyond -n: Optimizing tcpdump performance
2023-02-01/a>Jesse La GrewRotating Packet Captures with pfSense
2022-06-20/a>Johannes UllrichOdd TCP Fast Open Packets. Anybody understands why?
2022-03-20/a>Didier StevensMGLNDD_* Scans
2021-05-30/a>Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-02-25/a>Jim ClausingSo where did those Satori attacks come from?
2021-02-16/a>Jim ClausingMore weirdness on TCP port 26
2020-11-24/a>Johannes UllrichThe special case of TCP RST
2020-07-01/a>Jim ClausingSetting up the Dshield honeypot and tcp-honeypot.py
2020-06-28/a>Guy Bruneautcp-honeypot.py Logstash Parser & Dashboard Update
2020-05-01/a>Jim ClausingAttack traffic on TCP port 9673
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-02/a>Jim ClausingNext up, what's up with TCP port 26?
2019-10-03/a>Jim ClausingBuffer overflows found in libpcap and tcpdump
2019-06-18/a>Johannes UllrichWhat You Need To Know About TCP "SACK Panic"
2019-02-18/a>Didier StevensKnow What You Are Logging
2018-08-15/a>Xavier MertensTruncating Payloads and Anonymizing PCAP files
2018-01-18/a>Xavier MertensComment your Packet Captures!
2017-09-28/a>Xavier MertensThe easy way to analyze huge amounts of PCAP data
2017-04-22/a>Jim ClausingWTF tcp port 81
2017-02-02/a>Rick WannerNew tcpdump release -> 4.9.0 http://www.tcpdump.org/#latest-release
2017-01-31/a>Johannes UllrichMultiple Vulnerabilities in tcpdump
2017-01-28/a>Guy BruneauRequest for Packets and Logs - TCP 5358
2016-11-05/a>Xavier MertensFull Packet Capture for Dummies
2016-10-22/a>Guy BruneauRequest for Packets TCP 4786 - CVE-2016-6385
2015-05-10/a>Didier StevensWireshark TCP Flags: How To Install On Windows Video
2015-04-05/a>Didier StevensWireshark TCP Flags
2015-03-16/a>Johannes UllrichAutomatically Documenting Network Connections From New Devices Connected to Home Networks
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2013-11-27/a>Rob VandenBrinkATM Traffic + TCPDump + Video = Good or Evil?
2013-11-13/a>Johannes UllrichPacket Challenge for the Hivemind: What's happening with this Ethernet header?
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-10-01/a>Johannes UllrichiOS 7 Adds Multipath TCP
2012-01-06/a>Guy BruneauNew Version of tcpflow Available in Beta
2011-10-23/a>Guy Bruneautcpdump and IPv6
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-03-07/a>Lorna HutchesonCall for Packets - Unassigned TCP Options
2011-01-25/a>Johannes UllrichPacket Tricks with xxd
2010-08-01/a>Manuel Humberto Santander PelaezEvation because IPS fails to validate TCP checksums?
2010-06-15/a>Manuel Humberto Santander PelaezTCP evasions for IDS/IPS
2010-06-03/a>Johannes UllrichTop 10 Things you may not know about tcpdump
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2009-11-18/a>Rob VandenBrinkUsing a Cisco Router as a “Remote Collector” for tcpdump or Wireshark
2009-06-28/a>Guy BruneauIP Address Range Search with libpcap
2009-03-05/a>Mark HofmanWhat's up with port 445?
2008-10-01/a>Rick WannerHandler Mailbag

249

2011-04-28/a>Chris MohanGathering and use of location information fears - or is it all a bit too late
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-01-19/a>Jim ClausingThe IE saga continues, out-of-cycle patch coming soon
2010-01-15/a>Kevin ListonExploit code available for CVE-2010-0249