Last Updated: 2010-01-29 04:30:13 UTC
by Johannes Ullrich (Version: 1)
The 2nd part of the "Weathering the Storm" blog series is now live . In this series, I am looking at our web logs from isc.sans.org for attacks.
I picked Remote File Inclusion (RFI) attacks because we are getting thousands a day. Just take a quick look at our web honeypot project . Most of the attacks we detect are RFI attacks.