Date Author Title
2024-10-31Guy BruneauOctober 2024 Activity with Username chenzilong
2024-10-17Guy BruneauScanning Activity from Subnet 15.184.0.0/16
2024-10-03Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-09-18Guy BruneauTime-to-Live Analysis of DShield Data with Vega-Lite
2024-09-13Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-11Xavier MertensPython Libraries Used for Malicious Purposes
2024-09-11Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-06Jesse La GrewEnrichment Data: Keeping it Fresh
2024-08-27Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-16Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-07-10Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-25Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-03-07Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-25Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-18Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-02-15Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2024-02-03Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-30Johannes UllrichWhat did I say to make you stop talking to me?
2024-01-25Xavier MertensFacebook AdsManager Targeted by a Python Infostealer
2024-01-17Jesse La GrewNumber Usage in Passwords
2023-12-27Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-13Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-10Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-27Guy BruneauDecoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-20Jesse La GrewOverflowing Web Honeypot Logs
2023-10-15Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-09-26Johannes UllrichApple Releases MacOS Sonoma Including Numerous Security Patches
2023-09-14Jesse La GrewDShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-09Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-05Jesse La GrewCommon usernames submitted to honeypots
2023-09-02Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-31Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-12Guy BruneauDShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-07-23Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-13Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-07Xavier MertensDSSuite (Didier's Toolbox) Docker Image Update
2023-07-06Jesse La GrewIDS Comparisons with DShield Honeypot Data
2023-06-30Yee Ching TokDShield pfSense Client Update
2023-06-11Guy BruneauDShield Honeypot Activity for May 2023
2023-05-24Jesse La GrewMore Data Enrichment for Cowrie Logs
2023-05-14Guy BruneauDShield Sensor Update
2023-05-09Russ McReeExploratory Data Analysis with CISSM Cyber Attacks Database - Part 2
2023-04-05Jesse La GrewExploration of DShield Cowrie Data with jq
2023-03-07Johannes UllrichHackers Love This VSCode Extension: What You Can Do to Stay Safe
2023-01-31Jesse La GrewDShield Honeypot Setup with pfSense
2023-01-21Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-08Guy BruneauDShield Sensor JSON Log Analysis
2022-12-29Jesse La GrewOpening the Door for a Knock: Creating a Custom DShield Listener
2022-12-21Guy BruneauDShield Sensor Setup in Azure
2022-09-23Xavier MertensKids Like Cookies, Malware Too!
2022-07-06Johannes UllrichHow Many SANs are Insane?
2022-06-10Russ McReeEPSScall: An Exploit Prediction Scoring System App
2022-05-23Johannes UllrichAttacker Scanning for jQuery-File-Upload
2022-05-03Johannes UllrichSome Honeypot Updates
2022-03-15Xavier MertensClean Binaries with Suspicious Behaviour
2022-02-14Johannes UllrichReminder: Decoding TLS Client Hellos to non TLS servers
2022-01-29Guy BruneauSIEM In this Decade, Are They Better than the Last?
2021-12-28Russ McReeLotL Classifier tests for shells, exfil, and miners
2021-11-01Yee Ching TokRevisiting BrakTooth: Two Months Later
2021-10-18Xavier MertensMalicious PowerShell Using Client Certificate Authentication
2021-08-31Yee Ching TokBrakTooth: Impacts, Implications and Next Steps
2021-06-24Xavier MertensDo you Like Cookies? Some are for sale!
2021-05-30Didier StevensSysinternals: Procmon, Sysmon, TcpView and Process Explorer update
2021-05-20Johannes UllrichAre Cookie Banners a Waste of Time or a Complete Waste of Time?
2021-02-13Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-01-15Guy BruneauObfuscated DNS Queries
2021-01-02Guy BruneauProtecting Home Office and Enterprise in 2021
2020-12-04Guy BruneauDetecting Actors Activity with Threat Intel
2020-11-05Xavier MertensDid You Spot "Invoke-Expression"?
2020-08-25Xavier MertensKeep An Eye on LOLBins
2020-08-04Johannes UllrichInternet Choke Points: Concentration of Authoritative Name Servers
2020-07-04Russ McReeHappy FouRth of July from the Internet Storm Center
2020-07-01Jim ClausingSetting up the Dshield honeypot and tcp-honeypot.py
2020-06-20Tom WebbPi Zero HoneyPot
2020-06-19Remco VerhoefSigma rules! The generic signature format for SIEM systems.
2020-04-02Tom WebbTPOT's Cowrie to ISC Logs
2019-12-12Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-11-18Johannes UllrichSMS and 2FA: Another Reason to Move away from It.
2019-07-20Guy BruneauRe-evaluating Network Security - It is Increasingly More Complex
2019-07-09John BambenekSolving the WHOIS and Privacy Problem: A Draft of Implementing WHOIS in DNS
2019-05-10Xavier MertensDSSuite - A Docker Container with Didier's Tools
2019-04-04Xavier MertensNew Waves of Scans Detected by an Old Rule
2019-01-10Brad DuncanHeartbreaking Emails: "Love You" Malspam
2018-10-18Russ McReeCisco Security Advisories 17 OCT 2018
2018-06-21Xavier MertensAre Your Hunting Rules Still Working?
2018-06-16Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2018-06-07Remco VerhoefAutomated twitter loot collection
2018-05-25Xavier MertensAntivirus Evasion? Easy as 1,2,3
2017-12-30Xavier Mertens2017, The Flood of CVEs
2017-11-28Xavier MertensApple High Sierra Uses a Passwordless Root Account
2017-06-17Guy BruneauMapping Use Cases to Logs. Which Logs are the Most Important to Collect?
2017-05-28Guy BruneauCyberChef a Must Have Tool in your Tool bag!
2017-03-31Xavier MertensPro & Con of Outsourcing your SOC
2017-02-09Brad DuncanCryptoShield Ransomware from Rig EK
2017-02-03Lorna HutchesonCisco - Issue with Clock Signal Component
2016-11-25Xavier MertensFree Software Quick Security Checklist
2016-05-08Jim ClausingGuest Diary: Linux Capabilities - A friend and foe
2016-04-27Tom WebbKippos Cousin Cowrie
2016-03-21Xavier MertensIP Addresses Triage
2016-03-15Xavier MertensDockerized DShield SSH Honeypot
2016-03-13Xavier MertensSSH Honeypots (Ab)used as Proxy
2016-01-30Xavier MertensAll CVE Details at Your Fingertips
2015-12-24Xavier MertensUnity Makes Strength
2015-12-23Rob VandenBrinkLibraries and Dependencies - It Really is Turtles All The Way Down!
2015-10-17Russell EubanksCIS Critical Security Controls - Version 6.0
2015-09-03Xavier MertensQuerying the DShield API from RTIR
2015-08-18Russ McReeMicrosoft Security Bulletin MS15-093 - Critical OOB - Internet Explorer RCE
2015-07-31Russ McReeTech tip: Invoke a system command in R
2015-07-31Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-06-02Alex StanfordGuest Diary: Xavier Mertens - Playing with IP Reputation with Dshield & OSSEC
2015-06-01Tom WebbSubmit Dshield ASA Logs
2015-05-20Brad DuncanLogjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-03-11Rob VandenBrinkSyslog Skeet Shooting - Targetting Real Problems in Event Logs
2015-02-26Johannes UllrichNew Feature: Subnet Report
2015-02-19Daniel WesemannDNS-based DDoS
2015-02-03Johannes UllrichWhat is using this library?
2014-08-23Guy BruneauNSS Labs Cyber Resilience Report
2014-07-28Guy BruneauManagement and Control of Mobile Device Security
2014-06-17Rob VandenBrinkNew Security Advisories / Updates from Microsoft - Heads up for Next Patch Tuesday!
2014-05-21John BambenekNew, Unpatched IE 0 Day published at ZDI
2014-04-11Rob VandenBrinkThe Other Side of Heartbleed - Client Vulnerabilities
2014-02-24Russ McReeExplicit Trusted Proxy in HTTP/2.0 or...not so much
2014-02-14Chris MohanFireEye reports IE 10 zero-day being used in watering hole attack
2014-02-14Chris MohanSYM14-004 Symantec Endpoint Protection Management Vulnerabilities - http://www.symantec.com/business/support/index?page=content&id=TECH214866
2014-01-17Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2013-12-21Guy BruneauStrange DNS Queries - Request for Packets
2013-12-10Rob VandenBrinkThose Look Just Like Hashes!
2013-11-09Guy BruneauIE Zero-Day Vulnerability Exploiting msvcrt.dll
2013-10-16Adrien de BeaupreAccess denied and blockliss
2013-10-03Johannes UllrichOctober Patch Tuesday Preview (CVE-2013-3893 patch coming!)
2013-09-10Swa FrantzenAdobe September 2013 Black Tuesday Overview
2013-09-10Swa FrantzenMicrosoft September 2013 Black Tuesday Overview
2013-08-13Swa FrantzenMicrosoft August 2013 Black Tuesday Overview
2013-08-02Chris MohanCisco Security Advisory: OSPF LSA Manipulation Vulnerability in Multiple Cisco Products http://tools.cisco.com/security/center/viewAlert.x?alertId=30210
2013-07-23Bojan ZdrnjaSessions with(out) cookies
2013-07-09Swa FrantzenMicrosoft July 2013 Black Tuesday Overview
2013-07-06Guy BruneauIs Metadata the Magic in Modern Network Security?
2013-06-11Swa FrantzenMicrosoft June 2013 Black Tuesday Overview
2013-05-20Johannes UllrichUbuntu Package available to submit firewall logs to DShield
2013-05-14Swa FrantzenMicrosoft May 2013 Black Tuesday Overview
2013-05-14Swa FrantzenFirefox & Thunderbird released
2013-05-14Swa FrantzenAdobe May 2013 Black Tuesday Overview
2013-05-09Johannes UllrichMicrosoft released a Fix-it for the Internet Explorer 8 Vulnerability http://support.microsoft.com/kb/2847140
2013-05-04Kevin ShorttThe Zero-Day Pendulum Swings
2013-04-16John BambenekFake Boston Marathon Scams Update
2013-04-09Swa FrantzenMicrosoft April 2013 Black Tuesday Overview
2013-03-12Swa FrantzenMicrosoft March 2013 Black Tuesday Overview
2013-03-07Guy BruneauApple Blocking Java Web plug-in
2013-01-15Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2013-01-14Richard PorterMicrosoft Out of Cycle Patch: IE http://technet.microsoft.com/en-us/security/bulletin/ms13-jan
2013-01-09Richard PorterThe 80's called - They Want Their Mainframe Back!
2012-12-03Kevin ListonRecent SSH vulnerabilities
2012-10-30Mark HofmanCyber Security Awareness Month - Day 30 - DSD 35 mitigating controls
2012-10-24Rob VandenBrinkTime to run Windows Update - - Microsoft Updates KB2755801 for Windows RT / IE10 / Flash Player - http://technet.microsoft.com/en-us/security/advisory/2755801
2012-09-21Guy BruneauIE Cumulative Updates MS12-063 - KB2744842
2012-09-21Guy BruneauUpdate for Vulnerabilities in Adobe Flash Player in Internet Explorer 10 (2755801)
2012-09-17Rob VandenBrinkIE Zero Day is "For Real"
2012-07-23Johannes UllrichMost Anti-Privacy Web Browsing Tool Ever?
2012-06-29Bojan ZdrnjaDShield for Splunk
2012-05-25Guy BruneauVMware vMA Security Advisory VMSA-2012-0010 - http://www.vmware.com/security/advisories/VMSA-2012-0010.html
2012-05-22Johannes Ullrichnmap 6 released
2012-05-03Guy BruneauVMware Critical Security Issues Advisory - http://www.vmware.com/security/advisories/VMSA-2012-0009.html
2012-03-16Guy BruneauVMware New and Updated Security Advisories
2012-03-09Guy BruneauVMware New and Updated Advisories
2012-02-20Pedro BuenoSimple Malware Research Tools
2012-02-07Jim ClausingBook Review: Practical Packet Analysis, 2nd ed
2012-01-31Russ McReeFirefox 10 and VMWare advisories and updates
2012-01-05Russ McReeOpenSSL vulnerability fixes
2011-10-29Richard PorterThe Sub Critical Control? Evidence Collection
2011-10-13Kevin ShorttDennis M. Ritchie (1941 - 2011)
2011-08-30Scott FendleyCisco Security Advisory - Apache HTTPd DoS
2011-05-30Johannes UllrichAllied Telesis Passwords Leaked
2011-05-25Daniel WesemannFive new Cisco security advisories released. See http://www.cisco.com/go/psirt
2011-04-28Chris MohanCisco Security Advisories
2011-04-22Manuel Humberto Santander PelaezIn-house developed applications: The constant headache for the information security officer
2011-04-14Johannes Ullrichdshield.org now DNSSEC signed via .org
2011-02-02Chris MohanDefault Credentials for Root Account on Cisco Personal Video units
2011-01-05Johannes UllrichCurrently Unpatched Windows / Internet Explorer Vulnerabilities
2010-12-25Manuel Humberto Santander PelaezAn interesting vulnerability playground to learn application vulnerabilities
2010-12-23Mark HofmanIE 0 Day, just in time for Christmas
2010-12-18Raul SilesWhere are the Wi-Fi Driver Vulnerabilities?
2010-12-12Raul SilesNew trend regarding web application vulnerabilities?
2010-11-21Marcus SachsA Day In The Life Of A DShield Sensor
2010-11-17Guy BruneauCisco Unified Videoconferencing Affected by Multiple Vulnerabilities
2010-08-16Raul SilesThe Seven Deadly Sins of Security Vulnerability Reporting
2010-08-04Adrien de BeaupreMultiple Cisco Advisories
2010-07-24Manuel Humberto Santander PelaezTypes of diary: One liners vs full diary
2010-06-29Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-09Deborah HaleBest Practice to Prevent PDF Attacks
2010-04-26Raul SilesVulnerable Sites Database
2010-03-30Pedro BuenoVMWare Security Advisories Out
2010-03-29Adrien de BeaupreOOB Update for Internet Explorer MS10-018
2010-03-10Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-03-09John BambenekMarch 2010 - Microsoft Patch Tuesday Diary
2010-03-01Mark HofmanIE 0-day using .hlp files
2010-02-09Adrien de BeaupreWhen is a 0day not a 0day? Samba symlink bad default config
2010-01-24Pedro BuenoOutdated client applications
2010-01-19Jim ClausingThe IE saga continues, out-of-cycle patch coming soon
2010-01-18Stephen HallUplift in SSH brute forcing attacks
2009-12-05Guy BruneauJava JRE Buffer and Integer Overflow
2009-11-22Marcus SachsIE6 and IE7 0-Day Reported
2009-11-07Marcus SachsMore Thoughts on Legacy Systems
2009-10-26Johannes UllrichWeb honeypot Update
2009-10-14Johannes UllrichOdd Apache/MSIE issue with downloads from ISC
2009-10-02Stephen HallCyber Security Awareness Month - Day 2 - Port 0
2009-09-16Raul SilesIETF Draft for Remediation of Bots in ISP Networks
2009-09-10Guy BruneauFirefox 3.5.3 and 3.0.14 has been released
2009-06-11Jason LamDshield Web Honeypot going beta
2009-05-27donald smithWebDAV write-up
2009-04-20Jason LamDigital Content on TV
2009-04-14Swa FrantzenApril Black Tuesday Overview
2009-03-26Mark HofmanWebhoneypot fun
2009-03-24G. N. WhiteCanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?
2009-03-19Mark HofmanBrace yourselves - IE8 reported to be released
2009-03-19Mark HofmanBrowsers Tumble at CanSecWest
2009-03-10Swa FrantzenTinyURL and security
2009-03-10Swa FrantzenMarch black Tuesday overview
2009-02-25Andre LudwigPreview/Iphone/Linux pdf issues
2009-02-17Jason LamDShield Web Honeypot - Alpha Preview Release
2009-02-10Swa FrantzenFebruary Black Tuesday Overview
2009-02-02Stephen HallHow do you audit your production code?
2009-01-25Rick WannerTwam?? Twammers?
2008-12-16donald smithMicrosoft announces an out of band patch for IE zero day
2008-12-13Jim ClausingThe continuing IE saga - workarounds
2008-12-12Johannes UllrichMSIE 0-day Spreading Via SQL Injection
2008-12-12Kevin ListonIE7 0day expanded to include IE6 and IE8(beta)
2008-11-11Swa FrantzenNovember Black Tuesday Overview
2008-10-12Mari NicholsDay 12 Containment: Gathering Evidence That Can be Used in Court
2008-09-21Mari NicholsYou still have time!
2008-09-11David GoldsmithCookieMonster is coming to Pown (err, Town)
2008-08-10Stephen HallFake IE 7 update spam doing the rounds
2008-08-02Maarten Van HorenbeeckIssues affecting sites using Sitemeter [resolved]
2008-05-28Johannes UllrichReminder: Proper use of DShield data
2008-04-27Marcus SachsWhat's With Port 20329?
2008-03-30Mark HofmanMail Anyone?
2008-03-14Kevin ListonTemporal Search: Detecting Hidden Malware Timebombs with Virtual Machines
2006-12-18Toby KohlenbergORDB Shutting down
2006-10-05Swa FrantzenMS06-053 revisited ?
2006-10-02Jim ClausingBack to green, but the exploits are still running wild
2006-09-30Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading
2006-09-28Swa FrantzenMSIE: One patched, one pops up again (setslice)
2006-09-22Swa FrantzenYellow: MSIE VML exploit spreading
2006-09-19Swa FrantzenYet another MSIE 0-day: VML
2006-09-15Swa FrantzenMSIE DirectAnimation ActiveX 0-day update