2024-07-10 | Jesse La Grew | Finding Honeypot Data Clusters Using DBSCAN: Part 1 |
2024-04-29 | Johannes Ullrich | D-Link NAS Device Backdoor Abused |
2023-06-11 | Guy Bruneau | DShield Honeypot Activity for May 2023 |
2021-02-13 | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2021-02-05 | Xavier Mertens | VBA Macro Trying to Alter the Application Menus |
2020-02-14 | Xavier Mertens | Keep an Eye on Command-Line Browsers |
2019-07-16 | Russ McRee | Commando VM: The Complete Mandiant Offensive VM |
2018-07-30 | Xavier Mertens | Exploiting the Power of Curl |
2018-05-02 | Russ McRee | Windows Commands Reference - An InfoSec Must Have |
2016-07-26 | Johannes Ullrich | Command and Control Channels Using "AAAA" DNS Records |
2016-04-15 | Xavier Mertens | Windows Command Line Persistence? |
2015-10-12 | Guy Bruneau | Critical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2 |
2013-02-17 | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2010-02-06 | Guy Bruneau | LANDesk Management Gateway Vulnerability |
2010-01-27 | Raul Siles | Command Line Kung Fu |