ISC Feature of the Week: Security Dashboard

Published: 2012-02-07
Last Updated: 2012-02-07 21:56:29 UTC
by Adam Swanger (Version: 1)
1 comment(s)

The ISC Security Dashboard can be found at or and is an ideal tool for viewing summary DShield report data, ISC site content and related security information all in one place. Some places to use the page could be simply an open browser tab, an embedded web page, a control center monitor and more! Let us know where you use the dashboard in the comments section below.

The first section on the page contains the current UTC date/time and Refresh options. You can click to Refresh immediately or select to let the page auto-refresh every 5, 10, 20, 30 or 60 minutes. Additionally, when you select an interval, the reload will display a link you can bookmark to easily return to that timed refresh rate.

Row 1:
Column 1: World Map Country Report from
Column 2: Latest Diaries from and the ISC Search box that goes to
Column 3: Top 10 Source IPs from

Row 2:
DShield live banner, showing Top attacked and port attacked, that links to

Row 3:
Column 1: Top 10 Ports from
Column 2: Latest StormCast from and ISC/DShield Google Groups link/box for subscribing to
Column 3: Top 10 Rising Ports Trends graph from (NOTE: This graphic has location-sensitive click-able hot spots. Try it out!)

Row 4: Select Security News feeds

Row 5:
Column 1: Latest sans_isc tweets from
Column 2: Select SANS Reading Room Papers from
Column 3: Twitter list of tweets from ISC Handlers

Planned future improvements include html5 update which will allow blocks to be re-ordered and block location preferences saved to your ISC profile.

Let us know in the section below where you use, or are planning to use, the dashboard or if there's content you think would be a valuable addition to this page or send us any questions or comments in the contact form

Adam Swanger, Web Developer (GWEB)
Internet Storm Center (

Keywords: ISC feature
1 comment(s)
ISC StormCast for Tuesday, February 7th 2012

Secure E-Mail Access

Published: 2012-02-07
Last Updated: 2012-02-07 02:18:33 UTC
by Johannes Ullrich (Version: 1)
10 comment(s)

Recently attacks by the "not so sophisticated persistent threat" focused on e-mail security. In many cases, e-mail credentials were either brute forced, or retrieved from compromised databases (in some of these cases, password re-use was a contributing factor).

During Wednesday's threat update webcast, I would like to do a segment focusing on e-mail security, and was wondering what our readers do to secure e-mail. Some of the challenges I see:

- the use of "cloud based" e-mail services like gmail.
- mobile access to e-mail
- access to e-mail from multiple devices 
- e-mail encryption and authentication (PGP/S-Mime)
- e-mail forwarding security (if someone has e-mail forwarded to a personal e-mail address)

Please let me know if you have any novel ideas to address these problems that I should cover, or if you would like me to cover any additional questions.

Johannes B. Ullrich, Ph.D.
SANS Technology Institute

Keywords: email php smime
10 comment(s)

Book Review: Practical Packet Analysis, 2nd ed

Published: 2012-02-07
Last Updated: 2012-02-07 01:18:30 UTC
by Jim Clausing (Version: 1)
0 comment(s)

A few months ago, the good folks at No Starch Press sent me a review copy of Chris Sanders' book Practical Packet Analysis, Using Wireshark to Solve Real-world Problems, 2nd Edition.  While this isn't something we normally do here, since it has been a rather slow day at the Internet Storm Center, I thought this would be a great opportunity to share a short review of the book.  As many of our regular readers are probably aware, I tend to use command-line tools such as tcpdump, snort, tshark, scapy, or even Perl to perform packet analysis.  I prefer the command-line tools because when possible I like to script my analysis and GUI tools don't lend themselves to that.

This book (actually, starting with the 1st edition) was one that had been on my list of books I wanted to read for quite some time, but I had never gotten around to buying it, so I jumped at this opportunity when it presented itself. I really wanted to love the book, but wasn't quite able to get there.  A couple of small technical errors bothered me (probably more than they should have) and I was a little confused at who the target audience was (for example, if the book is targeted at newbies, it doesn't make sense to me to introduce filters before explaining the structure of IP packets including the IP, TCP, and UDP headers; if aimed at experienced networking folks, why bother with explaining the OSI model again).  Even so, I did like the book.  Starting with chapter 8 is where I think the book really becomes worthwhile.  I especially like the  idea of using "real-world scenarios" (even if sometimes a bit contrived) to teach the features of a tool.  This is often one of the best ways to teach new techniques or concepts.  I learned some new tricks for both wireshark and tshark which itself would have made it worth the price to me.  I'm not going to give it stars or anything, but I do recommend this book to folks that aren't wireshark experts (and even those who have plenty of wireshark experience may pick up a new trick or two).

Jim Clausing, GIAC GSE #26
jclausing --at-- isc [dot] sans (dot) edu

0 comment(s)


Diary Archives