Internet Storm Center
Sign In
Sign Up
Handler on Duty:
Xavier Mertens
Threat Level:
green
Date
Author
Title
CAPTURE THE FLAG CHALLENGE
2024-03-17
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
CAPTURE
2024-03-17/a>
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2024-03-03/a>
Guy Bruneau
Capturing DShield Packets with a LAN Tap [Guest Diary]
2022-02-13/a>
Guy Bruneau
DHL Spear Phishing to Capture Username/Password
2020-05-31/a>
Guy Bruneau
Windows 10 Built-in Packet Sniffer - PktMon
2017-09-17/a>
Guy Bruneau
rockNSM as a Incident Response Package
2017-04-13/a>
Rob VandenBrink
Packet Captures Filtered by Process
2016-11-05/a>
Xavier Mertens
Full Packet Capture for Dummies
2009-11-18/a>
Rob VandenBrink
Using a Cisco Router as a “Remote Collector” for tcpdump or Wireshark
2008-04-16/a>
William Stearns
Passer, a aassive machine and service sniffer
THE
2024-06-20/a>
Guy Bruneau
No Excuses, Free Tools to Help Secure Authentication in Ubuntu Linux [Guest Diary]
2024-03-17/a>
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2023-02-16/a>
Jan Kopriva
HTML phishing attachment with browser-in-the-browser technique
2022-02-05/a>
Didier Stevens
Power over Ethernet and Thermal Imaging
2022-02-01/a>
Xavier Mertens
Automation is Nice But Don't Replace Your Knowledge
2021-11-08/a>
Xavier Mertens
(Ab)Using Security Tools & Controls for the Bad
2021-10-18/a>
Xavier Mertens
Malicious PowerShell Using Client Certificate Authentication
2021-06-24/a>
Xavier Mertens
Do you Like Cookies? Some are for sale!
2021-05-29/a>
Guy Bruneau
Spear-phishing Email Targeting Outlook Mail Clients
2020-04-16/a>
Johannes Ullrich
Using AppLocker to Prevent Living off the Land Attacks
2019-11-11/a>
Johannes Ullrich
Are We Going Back to TheMoon (and How is Liquor Involved)?
2019-07-10/a>
Rob VandenBrink
Dumping File Contents in Hex (in PowerShell)
2019-01-30/a>
Russ McRee
CR19-010: The United States vs. Huawei
2018-11-20/a>
Xavier Mertens
Querying DShield from Cortex
2018-11-11/a>
Pasquale Stirparo
Community contribution: joining forces or multiply solutions?
2018-06-04/a>
Rob VandenBrink
Digging into Authenticode Certificates
2017-12-05/a>
Tom Webb
IR using the Hive Project.
2017-09-18/a>
Johannes Ullrich
SANS Securingthehuman posted a follow up to their Equifax breach webcast: https://securingthehuman.sans.org/blog/2017/09/15/equifax-webcast-follow-up
2017-01-11/a>
Johannes Ullrich
January 2017 Edition of Ouch! Security Awareness Newsletter Released: https://securingthehuman.sans.org/ouch
2016-11-02/a>
Rob VandenBrink
What Does a Pentest Look Like?
2016-10-07/a>
Rick Wanner
First Hurricane Matthew related Phish
2016-09-15/a>
Xavier Mertens
In Need of a OTP Manager Soon?
2016-05-02/a>
Rick Wanner
Lean Threat Intelligence
2015-12-15/a>
Russ McRee
Security Management vs Chaos: Understanding the Butterfly Effect to Manage Outcomes & Reduce Chaos
2015-09-23/a>
Daniel Wesemann
Making our users unlearn what we taught them
2015-08-16/a>
Guy Bruneau
Are you a "Hunter"?
2015-02-06/a>
Johannes Ullrich
Anthem, TurboTax and How Things "Fit Together" Sometimes
2014-07-02/a>
Johannes Ullrich
July Ouch! Security Awareness Newsletter Released. E-mail Do's and Don'ts http://www.securingthehuman.org/resources/newsletters/ouch/2014#july2014
2014-03-13/a>
Daniel Wesemann
Identification and authentication are hard ... finding out intention is even harder
2014-02-18/a>
Johannes Ullrich
More Details About "TheMoon" Linksys Worm
2014-02-05/a>
Johannes Ullrich
SANS Ouch Security Awareness Newsletter What is Malware http://www.securingthehuman.org/ouch
2013-12-20/a>
Daniel Wesemann
authorized key lime pie
2013-11-13/a>
Johannes Ullrich
Packet Challenge for the Hivemind: What's happening with this Ethernet header?
2013-09-18/a>
Rob VandenBrink
Cisco DCNM Update Released
2013-09-09/a>
Johannes Ullrich
SSL is broken. So what?
2013-09-05/a>
Rob VandenBrink
Building Your Own GPU Enabled Private Cloud
2013-08-09/a>
Kevin Shortt
Copy Machines - Changing Scanned Content
2013-03-23/a>
Guy Bruneau
Apple ID Two-step Verification Now Available in some Countries
2013-02-06/a>
Johannes Ullrich
Intel Network Card (82574L) Packet of Death
2013-02-04/a>
Adam Swanger
SAN Securing The Human Monthly Awareness Video - Advanced Persistent Threat (APT) http://www.securingthehuman.org/resources/ncsam
2012-10-26/a>
Adam Swanger
Securing the Human Special Webcast - October 30, 2012
2012-07-10/a>
Rob VandenBrink
Today at SANSFIRE (09 July 2012) - ISC Panel Discussion on the State of the Internet
2012-07-02/a>
Dan Goldberg
Storms of June 29th 2012 in Mid Atlantic region of the USA
2011-05-18/a>
Bojan Zdrnja
Android, HTTP and authentication tokens
2011-04-28/a>
Chris Mohan
Gathering and use of location information fears - or is it all a bit too late
2011-04-11/a>
Johannes Ullrich
Layer 2 DoS and other IPv6 Tricks
2011-01-12/a>
Richard Porter
Has Big Brother gone Global?
2010-12-21/a>
Rob VandenBrink
Network Reliability, Part 2 - HSRP Attacks and Defenses
2010-09-21/a>
Johannes Ullrich
Implementing two Factor Authentication on the Cheap
2010-07-24/a>
Manuel Humberto Santander Pelaez
Transmiting logon information unsecured in the network
2010-07-21/a>
Adrien de Beaupre
Dell PowerEdge R410 replacement motherboard firmware contains malware
2010-03-10/a>
Rob VandenBrink
Microsoft re-release of KB973811 - attacks on Extended Protection for Authentication
2010-02-09/a>
Adrien de Beaupre
When is a 0day not a 0day? Samba symlink bad default config
2009-11-11/a>
Rob VandenBrink
Layer 2 Network Protections against Man in the Middle Attacks
2008-10-15/a>
Rick Wanner
Day 15 - Containing the Damage From a Lost or Stolen Laptop
2006-10-05/a>
John Bambenek
There are no more Passive Exploits
2006-09-29/a>
Kevin Liston
A Report from the Field
FLAG
2024-03-17/a>
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2017-09-29/a>
Lorna Hutcheson
Good Analysis = Understanding(tools + logs + normal)
2015-05-10/a>
Didier Stevens
Wireshark TCP Flags: How To Install On Windows Video
2015-04-05/a>
Didier Stevens
Wireshark TCP Flags
CHALLENGE
2024-03-17/a>
Guy Bruneau
Gamified Learning: Using Capture the Flag Challenges to Supplement Cybersecurity Training [Guest Diary]
2022-12-10/a>
Didier Stevens
Open Now: 2022 SANS Holiday Hack Challenge & KringleCon
2021-12-22/a>
Brad Duncan
December 2021 Forensic Contest: Answers and Analysis
2021-12-08/a>
Brad Duncan
December 2021 Forensic Challenge
2020-08-02/a>
Didier Stevens
Small Challenge: A Simple Word Maldoc
2017-12-27/a>
Guy Bruneau
What are your Security Challenges for 2018?
2014-04-12/a>
Guy Bruneau
Interested in a Heartbleed Challenge?
2013-12-28/a>
Bojan Zdrnja
DRG online challenge(s)
2013-01-02/a>
Chris Mohan
Starting the New Year on the right foot
2012-04-16/a>
Mark Baggett
Challenge: What can you do with Funky Directory Names (Part 2)
2012-04-11/a>
Mark Baggett
Challenge: What can you do with funky directory names?
2011-09-07/a>
Lenny Zeltser
Analyzing Mobile Device Malware - Honeynet Forensic Challenge 9 and Some Tools
2010-12-23/a>
Mark Hofman
Skoudis' Annual Xmas Hacking Challenge - The Nightmare Before Charlie Brown's Christmas
2010-11-12/a>
Guy Bruneau
Honeynet Forensic Challenge - Analyzing Malicious Portable Destructive Files
2010-07-13/a>
Jim Clausing
Forensic challenge results
2010-06-04/a>
Rick Wanner
New Honeynet Project Forensic Challenge
2010-03-28/a>
Rick Wanner
Honeynet Project: 2010 Forensic Challenge #3
2010-01-27/a>
Raul Siles
European Union Security Challenge (Campus Party 2010)
2010-01-19/a>
Jim Clausing
Forensic challenges
2009-07-27/a>
Raul Siles
New Hacker Challenge: Prison Break - Breaking, Entering & Decoding
2008-03-25/a>
Raul Siles
New Security Challenge - It Happened One Friday
2008-03-23/a>
Johannes Ullrich
Finding hidden gems (easter eggs) in your logs (packet challenge!)
Homepage
Diaries
Podcasts
Jobs
Data
TCP/UDP Port Activity
Port Trends
SSH/Telnet Scanning Activity
Weblogs
Threat Feeds Activity
Threat Feeds Map
Useful InfoSec Links
Presentations & Papers
Research Papers
API
Tools
DShield Sensor
DNS Looking Glass
Honeypot (RPi/AWS)
InfoSec Glossary
Contact Us
Contact Us
About Us
Handlers
About Us
Slack Channel
Mastodon
Bluesky
X
Learn
about the Internet Storm Center
and our
volunteer InfoSec handlers