Date Author Title

LOG ANALYSIS

2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2023-01-21Guy BruneauDShield Sensor JSON Log to Elasticsearch
2021-04-10Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-01-30Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2020-10-01Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2017-07-09Russ McReeAdversary hunting with SOF-ELK
2014-04-21Daniel WesemannFinding the bleeders
2014-03-13Daniel WesemannWeb server logs containing RS=^ ?
2014-01-14Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2012-12-02Guy BruneauCollecting Logs from Security Devices at Home

LOG

2024-09-17/a>Xavier Mertens23:59, Time to Exfiltrate!
2024-07-24/a>Xavier Mertens"Mouse Logger" Malicious Python Script
2024-05-28/a>Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-08/a>Xavier MertensAnalyzing Synology Disks on Linux
2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2024-02-08/a>Xavier MertensA Python MP3 Player with Builtin Keylogger Capability
2023-12-23/a>Xavier MertensPython Keylogger Using Mailtrap.io
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-04-18/a>Johannes UllrichUDDIs are back? Attackers rediscovering old exploits.
2023-04-08/a>Xavier MertensMicrosoft Netlogon: Potential Upcoming Impacts of CVE-2022-38023
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-07-20/a>Xavier MertensMalicious Python Script Behaving Like a Rubber Ducky
2022-04-25/a>Xavier MertensSimple PDF Linking to Malicious Content
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-02-23/a>Johannes UllrichThe Rise and Fall of log4shell
2022-01-29/a>Guy BruneauSIEM In this Decade, Are They Better than the Last?
2022-01-17/a>Johannes UllrichLog4Shell Attacks Getting "Smarter"
2021-12-29/a>Russ McReeLog4j 2 Security Vulnerabilities Update Guide
2021-12-23/a>Johannes Ullrichlog4shell and cloud provider internal meta data services (IMDS)
2021-12-23/a>Johannes UllrichDefending Cloud IMDS Against log4shell (and more)
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-11/a>Johannes UllrichLog4j / Log4Shell Followup: What we see and how to defend (and how to access our data)
2021-12-10/a>Bojan ZdrnjaRCE in log4j, Log4Shell, or how things can get bad quickly
2021-10-11/a>Johannes UllrichThings that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-06-11/a>Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-04-10/a>Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-03-18/a>Xavier MertensSimple Python Keylogger
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-02-13/a>Guy BruneauUsing Logstash to Parse IPtables Firewall Logs
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-10-29/a>Johannes UllrichPATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-10-01/a>Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-08-14/a>Jan KoprivaDefinition of 'overkill' - using 130 MB executable to hide 24 kB malware
2020-07-27/a>Johannes UllrichIn Memory of Donald Smith
2020-07-23/a>Xavier MertensSimple Blocklisting with MISP & pfSense
2020-02-12/a>Rob VandenBrinkMarch Patch Tuesday is Coming - the LDAP Changes will Change Your Life!
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-10-30/a>Xavier MertensKeep an Eye on Remote Access to Mailboxes
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-06-19/a>Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-06-06/a>Xavier MertensKeep an Eye on Your WMI Logs
2019-05-19/a>Guy BruneauIs Metadata Only Approach, Good Enough for Network Traffic Analysis?
2019-04-28/a>Johannes UllrichUpdate about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)
2019-04-25/a>Rob VandenBrinkUnpatched Vulnerability Alert - WebLogic Zero Day
2019-02-21/a>Xavier MertensSimple Powershell Keyloggers are Back
2019-02-18/a>Didier StevensKnow What You Are Logging
2019-02-07/a>Xavier Mertens Phishing Kit with JavaScript Keylogger
2018-07-20/a>Kevin ListonWeblogic Exploit Code Made Public (CVE-2018-2893)
2018-07-17/a>Xavier MertensSearching for Geographically Improbable Login Attempts
2018-06-21/a>Xavier MertensAre Your Hunting Rules Still Working?
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-06/a>Xavier MertensConverting PCAP Web Traffic to Apache Log
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2017-09-29/a>Lorna HutchesonGood Analysis = Understanding(tools + logs + normal)
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-04-20/a>Xavier MertensDNS Query Length... Because Size Does Matter
2016-12-27/a>Guy BruneauUsing daemonlogger as a Software Tap
2016-08-29/a>Russ McReeRecommended Reading: Intrusion Detection Using Indicators of Compromise Based on Best Practices and Windows Event Logs
2016-06-01/a>Xavier MertensDocker Containers Logging
2015-07-31/a>Russ McReeTech tip: Invoke a system command in R
2015-07-31/a>Russ McReeTech tip follow-up: Using the data Invoked with R's system command
2015-06-01/a>Tom WebbSubmit Dshield ASA Logs
2015-05-20/a>Brad DuncanLogjam - vulnerabilities in Diffie-Hellman key exchange affect browsers and servers using TLS
2015-04-23/a>Bojan ZdrnjaWhen automation does not help
2015-03-11/a>Rob VandenBrinkSyslog Skeet Shooting - Targetting Real Problems in Event Logs
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2014-09-22/a>Johannes UllrichFake LogMeIn Certificate Update with Bad AV Detection Rate
2014-08-15/a>Tom WebbAppLocker Event Logs with OSSEC 2.8
2014-08-05/a>Johannes UllrichSynolocker: Why OFFLINE Backups are important
2014-04-21/a>Daniel WesemannFinding the bleeders
2014-04-04/a>Rob VandenBrinkDealing with Disaster - A Short Malware Incident Response
2014-04-01/a>Johannes Ullrichcmd.so Synology Scanner Also Found on Routers
2014-03-31/a>Johannes UllrichMore Device Malware: This is why your DVR attacked my Synology Disk Station (and now with Bitcoin Miner!)
2014-03-28/a>Johannes UllrichWar of the Bots: When DVRs attack NASs
2014-03-26/a>Johannes UllrichLet's Finally "Nail" This Port 5000 Traffic - Synology owners needed.
2014-03-13/a>Daniel WesemannWeb server logs containing RS=^ ?
2014-02-14/a>Chris MohanScanning activity for /siemens/bootstrapping/JnlpBrowser/Development/
2014-02-09/a>Basil Alawi S.TaherMandiant Highlighter 2
2014-01-27/a>Basil Alawi S.TaherLog Parsing with Mandiant Highlighter (1)
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2014-01-04/a>Tom WebbMonitoring Windows Networks Using Syslog (Part One)
2013-12-03/a>Rob VandenBrinkEven in the Quietest Moments ...
2013-11-16/a>Guy BruneauSagan as a Log Normalizer
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2013-09-24/a>Tom WebbIDS, NSM, and Log Management with Security Onion 12.04.3
2013-09-11/a>Alex StanfordGetting Started with Rsyslog Filters
2013-09-02/a>Guy BruneauSnort IDS Sensor with Sguil New ISO Released
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2013-02-27/a>Adam SwangerGuest Diary: Dylan Johnson - There's value in them there logs!
2013-02-22/a>Chris MohanPHP 5.4.12 and PHP 5.3.22 released http://www.php.net/ChangeLog-5.php
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2013-02-06/a>Johannes UllrichAre you losing system logging information (and don't know it)?
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-07-13/a>Russ McRee2 for 1: SANSFIRE & MSRA presentations
2012-07-11/a>Rick WannerExcellent Security Education Resources
2012-05-02/a>Bojan ZdrnjaMonitoring VMWare logs
2012-04-08/a>Chris MohanBlog Log: More noise or a rich source of intelligence?
2011-11-19/a>Kevin ListonMonitoring your Log Monitoring Process
2011-06-21/a>Chris MohanAustralian government security audit report shows tough love to agencies
2011-06-20/a>Chris MohanLog files - are you reviewing yours?
2011-05-17/a>Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2011-03-29/a>Daniel WesemannMaking sense of RSA ACE server audit logs
2011-03-11/a>Guy BruneauSnort IDS Sensor with Sguil Framework ISO
2011-01-24/a>Rob VandenBrinkWhere have all the COM Ports Gone? - How enumerating COM ports led to me finding a “misplaced” Microsoft tool
2010-12-24/a>Daniel WesemannA question of class
2010-09-28/a>Daniel WesemannSupporting the economy (in Russia and Ukraine)
2010-07-24/a>Manuel Humberto Santander PelaezTransmiting logon information unsecured in the network
2010-04-06/a>Daniel WesemannApplication Logs
2010-03-10/a>Rob VandenBrinkWhat's My Firewall Telling Me? (Part 4)
2010-03-05/a>Kyle HaugsnessWhat is your firewall log telling you - responses
2010-02-23/a>Mark HofmanWhat is your firewall telling you and what is TCP249?
2010-02-06/a>Guy BruneauOracle WebLogic Server Security Alert
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-10-26/a>Johannes UllrichToday: ISC Login bugfix day. If you have issues logging in using OpenID, please email a copy of your OpenID URL to jullrich\at\sans.edu
2009-04-16/a>Adrien de BeaupreStrange Windows Event Log entry
2009-04-09/a>Johannes UllrichConficker update with payload
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-01-09/a>Johannes UllrichSANS Log Management Survey
2008-11-05/a>donald smithIf you missed President Elect Obamas speech have some malware instead
2008-08-19/a>Johannes UllrichA morning stroll through my web logs
2008-08-05/a>Daniel WesemannWatching those DNS logs
2006-10-02/a>Jim ClausingReader's tip of the day: ratios vs. raw counts
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts

ANALYSIS

2024-12-11/a>Guy BruneauVulnerability Symbiosis: vSphere?s CVE-2024-38812 and CVE-2024-38813 [Guest Diary]
2024-10-17/a>Guy BruneauScanning Activity from Subnet 15.184.0.0/16
2024-09-25/a>Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-18/a>Guy BruneauTime-to-Live Analysis of DShield Data with Vega-Lite
2024-09-11/a>Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-08-27/a>Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-06-13/a>Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-05-28/a>Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-04-29/a>Guy BruneauLinux Trojan - Xorddos with Filename eyshcjdmzg
2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2024-02-25/a>Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2023-11-17/a>Jan KoprivaPhishing page with trivial anti-analysis features
2023-02-04/a>Guy BruneauAssemblyline as a Malware Analysis Sandbox
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-08/a>Guy BruneauDShield Sensor JSON Log Analysis
2022-07-29/a>Johannes UllrichPDF Analysis Intro and OpenActions Entries
2022-07-18/a>Didier StevensAdding Your Own Keywords To My PDF Tools
2022-06-01/a>Jan KoprivaHTML phishing attachments - now with anti-analysis features
2021-04-10/a>Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-04-06/a>Jan KoprivaMalspam with Lokibot vs. Outlook and RFCs
2021-01-30/a>Guy BruneauPacketSifter as Network Parsing and Telemetry Tool
2021-01-14/a>Bojan ZdrnjaDynamically analyzing a heavily obfuscated Excel 4 macro malicious file
2020-12-03/a>Brad DuncanTraffic Analysis Quiz: Mr Natural
2020-11-11/a>Brad DuncanTraffic Analysis Quiz: DESKTOP-FX23IK5
2020-10-01/a>Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-09-20/a>Guy BruneauAnalysis of a Salesforce Phishing Emails
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-02/a>Guy BruneauPhishing PDF with Unusual Hostname
2020-01-25/a>Guy BruneauIs Threat Hunting the new Fad?
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-12-29/a>Guy BruneauELK Dashboard for Pihole Logs
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-11-23/a>Guy BruneauLocal Malware Analysis with Malice
2019-10-18/a>Xavier MertensQuick Malicious VBS Analysis
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-14/a>Jim ClausingA few Ghidra tips for IDA users, part 4 - function call graphs
2019-04-17/a>Jim ClausingA few Ghidra tips for IDA users, part 2 - strings and parameters
2019-04-08/a>Jim ClausingA few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code
2019-04-03/a>Jim ClausingA few Ghidra tips for IDA users, part 0 - automatic comments for API call parameters
2019-03-31/a>Didier StevensMaldoc Analysis of the Weekend by a Reader
2019-02-27/a>Didier StevensMaldoc Analysis by a Reader
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-10-21/a>Pasquale StirparoBeyond good ol’ LaunchAgent - part 0
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-06-01/a>Remco VerhoefBinary analysis with Radare2
2017-09-29/a>Lorna HutchesonGood Analysis = Understanding(tools + logs + normal)
2017-07-09/a>Russ McReeAdversary hunting with SOF-ELK
2017-04-28/a>Russell EubanksKNOW before NO
2017-01-28/a>Lorna HutchesonPacket Analysis - Where do you start?
2016-12-24/a>Didier StevensPinging All The Way
2016-10-30/a>Pasquale StirparoVolatility Bot: Automated Memory Analysis
2016-10-17/a>Didier StevensMaldoc VBA Anti-Analysis: Video
2016-10-15/a>Didier StevensMaldoc VBA Anti-Analysis
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (Part #2)
2015-05-03/a>Russ McReeVolDiff, for memory image differential analysis
2014-07-05/a>Guy BruneauMalware Analysis with pedump
2014-04-21/a>Daniel WesemannFinding the bleeders
2014-03-13/a>Daniel WesemannWeb server logs containing RS=^ ?
2014-01-14/a>Chris MohanSpamming and scanning botnets - is there something I can do to block them from my site?
2013-10-28/a>Daniel WesemannExploit cocktail (Struts, Java, Windows) going after 3-month old vulnerabilities
2013-06-18/a>Russ McReeVolatility rules...any questions?
2013-05-11/a>Lenny ZeltserExtracting Digital Signatures from Signed Malware
2013-03-09/a>Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-02-03/a>Lorna HutchesonIs it Really an Attack?
2013-01-08/a>Jim ClausingCuckoo 0.5 is out and the world didn't end
2012-12-02/a>Guy BruneauCollecting Logs from Security Devices at Home
2012-09-19/a>Kevin ListonVolatility: 2.2 is Coming Soon
2012-09-14/a>Lenny ZeltserAnalyzing Malicious RTF Files Using OfficeMalScanner's RTFScan
2012-06-21/a>Russ McReeAnalysis of drive-by attack sample set
2012-06-04/a>Lenny ZeltserDecoding Common XOR Obfuscation in Malicious Code
2012-05-23/a>Mark BaggettIP Fragmentation Attacks
2012-03-03/a>Jim ClausingNew automated sandbox for Android malware
2012-02-07/a>Jim ClausingBook Review: Practical Packet Analysis, 2nd ed
2011-05-20/a>Guy BruneauSysinternals Updates, Analyzing Stuxnet Infection with Sysinternals Tools Part 3
2011-04-14/a>Adrien de BeaupreSysinternals updates, a new blog post, and webcast
2011-02-01/a>Lenny ZeltserThe Importance of HTTP Headers When Investigating Malicious Sites
2010-08-09/a>Jim ClausingFree/inexpensive tools for monitoring systems/networks
2010-07-21/a>Adrien de Beaupreautorun.inf and .lnk Malware (NOT 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198)
2010-05-26/a>Bojan ZdrnjaMalware modularization and AV detection evasion
2010-04-11/a>Marcus SachsNetwork and process forensics toolset
2010-03-26/a>Daniel WesemannGetting the EXE out of the RTF again
2010-02-13/a>Lorna HutchesonNetwork Traffic Analysis in Reverse
2010-01-14/a>Bojan ZdrnjaPDF Babushka
2010-01-07/a>Daniel WesemannStatic analysis of malicious PDFs
2010-01-07/a>Daniel WesemannStatic analysis of malicous PDFs (Part #2)
2009-11-25/a>Jim ClausingUpdates to my GREM Gold scripts and a new script
2009-11-03/a>Bojan ZdrnjaOpachki, from (and to) Russia with love
2009-09-25/a>Lenny ZeltserCategories of Common Malware Traits
2009-07-26/a>Jim ClausingNew Volatility plugins
2009-07-02/a>Daniel WesemannGetting the EXE out of the RTF
2009-04-15/a>Marcus Sachs2009 Data Breach Investigation Report
2009-03-13/a>Bojan ZdrnjaWhen web application security, Microsoft and the AV vendors all fail
2009-02-10/a>Bojan ZdrnjaMore tricks from Conficker and VM detection
2009-02-09/a>Bojan ZdrnjaSome tricks from Conficker's bag
2009-01-18/a>Daniel Wesemann3322. org
2009-01-15/a>Bojan ZdrnjaConficker's autorun and social engineering
2009-01-07/a>Bojan ZdrnjaAn Israeli patriot program or a trojan
2009-01-02/a>Rick WannerTools on my Christmas list.
2008-12-13/a>Jim ClausingFollowup from last shift and some research to do.
2008-11-17/a>Marcus SachsNew Tool: NetWitness Investigator
2008-11-17/a>Jim ClausingFinding stealth injected DLLs
2008-09-03/a>Daniel WesemannStatic analysis of Shellcode - Part 2
2008-07-07/a>Pedro BuenoBad url classification
2006-10-02/a>Jim ClausingReader's tip of the day: ratios vs. raw counts
2006-09-18/a>Jim ClausingLog analysis follow up
2006-09-09/a>Jim ClausingLog Analysis tips?
2006-09-09/a>Jim ClausingA few preliminary log analysis thoughts