SQL INJECTION WEB APPLICATION FIREWALL |
2008-11-20 | Jason Lam | Large quantity SQL Injection mitigation |
SQL |
2025-02-20/a> | Guy Bruneau | Using ES|QL in Kibana to Queries DShield Honeypot Logs |
2025-01-16/a> | Jesse La Grew | Extracting Practical Observations from Impractical Datasets |
2023-08-25/a> | Xavier Mertens | Python Malware Using Postgresql for C2 Communications |
2023-08-10/a> | Bojan Zdrnja | Some things never change ? such as SQL Authentication ?encryption? |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2017-08-07/a> | Xavier Mertens | Increase of phpMyAdmin scans |
2017-08-02/a> | Bojan Zdrnja | Attacking NoSQL applications (part 2) |
2017-04-26/a> | Johannes Ullrich | If there are some unexploited MSSQL Servers With Weak Passwords Left: They got you now (again) |
2016-12-06/a> | Bojan Zdrnja | Attacking NoSQL applications |
2016-08-11/a> | Pasquale Stirparo | Looking for the insider: Forensic Artifacts on iOS Messaging App |
2016-06-03/a> | Tom Liston | MySQL is YourSQL |
2016-04-27/a> | Tom Webb | Kippos Cousin Cowrie |
2016-02-15/a> | Bojan Zdrnja | Exploiting (pretty) blind SQL injections |
2013-10-19/a> | Johannes Ullrich | Yet Another WHMCS SQL Injection Exploit |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-04-04/a> | Johannes Ullrich | Postgresql Patches Critical Vulnerability |
2013-03-03/a> | Richard Porter | Uptick in MSSQL Activity |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2012-12-02/a> | Guy Bruneau | Zero Day MySQL Buffer Overflow |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-09-21/a> | Guy Bruneau | Storing your Collection of Malware Samples with Malwarehouse |
2012-07-31/a> | Daniel Wesemann | SQL injection, lilupophilupop-style |
2012-06-11/a> | Johannes Ullrich | Exploit Available for Trivial MySQL Password Bypass |
2011-12-01/a> | Mark Hofman | SQL Injection Attack happening ATM |
2011-06-06/a> | Johannes Ullrich | The Havij SQL Injection Tool |
2011-04-19/a> | Bojan Zdrnja | SQL injection: why can’t we learn? |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2010-12-02/a> | Kevin Johnson | SQL Injection: Wordpress 3.0.2 released |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-05-21/a> | Rick Wanner | MySQL 5.1.47 is now available - http://www.mysql.com/downloads/mysql/ |
2010-05-16/a> | Rick Wanner | Upcoming MySQL patch fixes several critical vulnerabilites |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-05-19/a> | Bojan Zdrnja | Advanced blind SQL injection (with Oracle examples) |
2009-05-09/a> | Patrick Nolan | Shared SQL Injection Lessons Learned blog item |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-02-11/a> | Robert Danford | ProFTPd SQL Authentication Vulnerability exploit activity |
2008-12-23/a> | Patrick Nolan | MS ACK's Vulnerability in SQL Server which Could Allow Remote Code Execution |
2008-12-15/a> | Toby Kohlenberg | New MS SQL Server vulnerability |
2008-12-12/a> | Johannes Ullrich | MSIE 0-day Spreading Via SQL Injection |
2008-12-01/a> | Jason Lam | Input filtering and escaping in SQL injection mitigation |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-29/a> | Daniel Wesemann | ASPROX mutant |
2008-09-01/a> | John Bambenek | The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months |
2008-08-23/a> | Mark Hofman | SQL injections - an update |
2008-08-08/a> | Mark Hofman | More SQL Injections - very active right now |
2008-07-24/a> | Bojan Zdrnja | What's brewing in Danmec's pot? |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-24/a> | Jason Lam | Microsoft SQL Injection Prevention Strategy |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-13/a> | Johannes Ullrich | SQL Injection: More of the same |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2008-04-16/a> | Bojan Zdrnja | The 10.000 web sites infection mystery solved |
2008-03-14/a> | Kevin Liston | 2117966.net-- mass iframe injection |
2008-01-09/a> | Bojan Zdrnja | Mass exploits with SQL Injection |
2007-02-24/a> | Jason Lam | Prepared Statements and SQL injections |
INJECTION |
2024-12-17/a> | Guy Bruneau | Command Injection Exploit For PHPUnit before 4.8.28 and 5.x before 5.6.3 [Guest Diary] |
2024-07-25/a> | Xavier Mertens | XWorm Hidden With Process Hollowing |
2024-04-29/a> | Johannes Ullrich | D-Link NAS Device Backdoor Abused |
2023-11-09/a> | Xavier Mertens | Visual Examples of Code Injection |
2022-09-14/a> | Xavier Mertens | Easy Process Injection within Python |
2022-02-10/a> | Johannes Ullrich | Zyxel Network Storage Devices Hunted By Mirai Variant |
2022-01-20/a> | Xavier Mertens | RedLine Stealer Delivered Through FTP |
2021-12-21/a> | Xavier Mertens | More Undetected PowerShell Dropper |
2021-12-10/a> | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-11-20/a> | Guy Bruneau | Hikvision Security Cameras Potentially Exposed to Remote Code Execution |
2021-07-06/a> | Xavier Mertens | Python DLL Injection Check |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2021-04-29/a> | Xavier Mertens | From Python to .Net |
2021-02-13/a> | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2020-11-19/a> | Xavier Mertens | PowerShell Dropper Delivering Formbook |
2020-09-24/a> | Xavier Mertens | Party in Ibiza with PowerShell |
2020-08-28/a> | Xavier Mertens | Example of Malicious DLL Injected in PowerShell |
2020-07-30/a> | Johannes Ullrich | Python Developers: Prepare!!! |
2018-09-28/a> | Xavier Mertens | More Excel DDE Code Injection |
2018-09-05/a> | Xavier Mertens | Malicious PowerShell Compiling C# Code on the Fly |
2017-05-05/a> | Xavier Mertens | HTTP Headers... the Achilles' heel of many applications |
2016-02-15/a> | Bojan Zdrnja | Exploiting (pretty) blind SQL injections |
2013-10-19/a> | Johannes Ullrich | Yet Another WHMCS SQL Injection Exploit |
2013-07-16/a> | Johannes Ullrich | Why don't we see more examples of web app attacks via POST? |
2013-02-17/a> | Guy Bruneau | HP ArcSight Connector Appliance and Logger Vulnerabilities |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2013-01-09/a> | Rob VandenBrink | SQL Injection Flaw in Ruby on Rails |
2012-10-05/a> | Richard Porter | Reports of a Distributed Injection Scan |
2012-07-31/a> | Daniel Wesemann | SQL injection, lilupophilupop-style |
2011-12-01/a> | Mark Hofman | SQL Injection Attack happening ATM |
2011-06-06/a> | Johannes Ullrich | The Havij SQL Injection Tool |
2011-04-19/a> | Bojan Zdrnja | SQL injection: why can’t we learn? |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2010-12-02/a> | Kevin Johnson | SQL Injection: Wordpress 3.0.2 released |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Obfuscated SQL Injection attacks |
2010-06-09/a> | Deborah Hale | Mass Infection of IIS/ASP Sites |
2010-02-06/a> | Guy Bruneau | LANDesk Management Gateway Vulnerability |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-05-19/a> | Bojan Zdrnja | Advanced blind SQL injection (with Oracle examples) |
2009-05-09/a> | Patrick Nolan | Shared SQL Injection Lessons Learned blog item |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-02-11/a> | Robert Danford | ProFTPd SQL Authentication Vulnerability exploit activity |
2008-12-12/a> | Johannes Ullrich | MSIE 0-day Spreading Via SQL Injection |
2008-12-01/a> | Jason Lam | Input filtering and escaping in SQL injection mitigation |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-29/a> | Daniel Wesemann | ASPROX mutant |
2008-09-01/a> | John Bambenek | The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months |
2008-08-23/a> | Mark Hofman | SQL injections - an update |
2008-08-08/a> | Mark Hofman | More SQL Injections - very active right now |
2008-07-24/a> | Bojan Zdrnja | What's brewing in Danmec's pot? |
2008-06-30/a> | Marcus Sachs | More SQL Injection with Fast Flux hosting |
2008-06-24/a> | Jason Lam | SQL Injection mitigation in ASP |
2008-06-24/a> | Jason Lam | Microsoft SQL Injection Prevention Strategy |
2008-06-23/a> | donald smith | Preventing SQL injection |
2008-06-13/a> | Johannes Ullrich | SQL Injection: More of the same |
2008-05-20/a> | Raul Siles | List of malicious domains inserted through SQL injection |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2008-04-16/a> | Bojan Zdrnja | The 10.000 web sites infection mystery solved |
2008-03-14/a> | Kevin Liston | 2117966.net-- mass iframe injection |
2008-01-09/a> | Bojan Zdrnja | Mass exploits with SQL Injection |
2007-02-24/a> | Jason Lam | Prepared Statements and SQL injections |
WEB |
2025-03-09/a> | Johannes Ullrich | Commonly Probed Webshell URLs |
2025-02-26/a> | Jesse La Grew | [Guest Diary] Malware Source Servers: The Threat of Attackers Using Ephemeral Ports as Service Ports to Upload Data |
2024-12-26/a> | Jesse La Grew | Capturing Honeypot Data Beyond the Logs |
2024-11-06/a> | Jesse La Grew | [Guest Diary] Insights from August Web Traffic Surge |
2024-01-22/a> | Johannes Ullrich | Apple Updates Everything - New 0 Day in WebKit |
2024-01-08/a> | Jesse La Grew | What is that User Agent? |
2023-07-23/a> | Guy Bruneau | Install & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs |
2023-05-03/a> | Xavier Mertens | Increased Number of Configuration File Scans |
2023-04-18/a> | Johannes Ullrich | UDDIs are back? Attackers rediscovering old exploits. |
2023-02-25/a> | Didier Stevens | Crypto Inside a Browser |
2023-02-24/a> | Brad Duncan | URL files and WebDAV used for IcedID (Bokbot) infection |
2022-09-21/a> | Xavier Mertens | Phishing Campaigns Use Free Online Resources |
2022-08-23/a> | Xavier Mertens | Who's Looking at Your security.txt File? |
2022-08-17/a> | Johannes Ullrich | Apple Patches Two Exploited Vulnerabilities |
2022-08-01/a> | Johannes Ullrich | A Little DDoS In the Morning |
2022-04-05/a> | Johannes Ullrich | WebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools |
2022-03-11/a> | Xavier Mertens | Keep an Eye on WebSockets |
2022-02-07/a> | Johannes Ullrich | web3 phishing via self-customizing landing pages |
2021-12-07/a> | Johannes Ullrich | Webshells, Webshells everywhere! |
2021-12-01/a> | Xavier Mertens | Info-Stealer Using webhook.site to Exfiltrate Data |
2021-10-11/a> | Johannes Ullrich | Things that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers |
2021-10-09/a> | Guy Bruneau | Scanning for Previous Oracle WebLogic Vulnerabilities |
2021-06-24/a> | Xavier Mertens | Do you Like Cookies? Some are for sale! |
2021-04-24/a> | Guy Bruneau | Base64 Hashes Used in Web Scanning |
2020-11-07/a> | Guy Bruneau | Cryptojacking Targeting WebLogic TCP/7001 |
2020-10-29/a> | Johannes Ullrich | PATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots |
2020-08-10/a> | Bojan Zdrnja | Scoping web application and web service penetration tests |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-09-24/a> | Xavier Mertens | Huge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs |
2019-08-28/a> | Johannes Ullrich | [Guest Diary] Open Redirect: A Small But Very Common Vulnerability |
2019-08-01/a> | Johannes Ullrich | What is Listening On Port 9527/TCP? |
2019-06-19/a> | Johannes Ullrich | Critical Actively Exploited WebLogic Flaw Patched CVE-2019-2729 |
2019-04-28/a> | Johannes Ullrich | Update about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status) |
2019-04-25/a> | Rob VandenBrink | Unpatched Vulnerability Alert - WebLogic Zero Day |
2019-02-02/a> | Guy Bruneau | Scanning for WebDAV PROPFIND Exploiting CVE-2017-7269 |
2018-11-17/a> | Xavier Mertens | Quickly Investigating Websites with Lookyloo |
2018-07-20/a> | Kevin Liston | Weblogic Exploit Code Made Public (CVE-2018-2893) |
2018-05-03/a> | Renato Marinho | WebLogic Exploited in the Wild (Again) |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2017-09-14/a> | Xavier Mertens | Another webshell, another backdoor! |
2017-07-19/a> | Xavier Mertens | Bots Searching for Keys & Config Files |
2017-06-01/a> | Xavier Mertens | Sharing Private Data with Webcast Invitations |
2017-05-12/a> | Xavier Mertens | When Bad Guys are Pwning Bad Guys... |
2017-04-07/a> | Xavier Mertens | Tracking Website Defacers with HTTP Referers |
2017-04-02/a> | Guy Bruneau | IPFire - A Household Multipurpose Security Gateway |
2017-02-28/a> | Xavier Mertens | Analysis of a Simple PHP Backdoor |
2017-01-24/a> | Johannes Ullrich | Critical Vulnerability in Cisco WebEx Chrome Plugin |
2017-01-14/a> | Xavier Mertens | Backup Files Are Good but Can Be Evil |
2016-07-13/a> | Xavier Mertens | The Power of Web Shells |
2016-01-29/a> | Xavier Mertens | Scripting Web Categorization |
2015-06-25/a> | Bojan Zdrnja | Web security subtleties and exploitation of combined vulnerabilities |
2015-04-23/a> | Bojan Zdrnja | When automation does not help |
2015-04-14/a> | Johannes Ullrich | Odd POST Request To Web Honeypot |
2014-08-16/a> | Lenny Zeltser | Web Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-06-11/a> | Daniel Wesemann | Gimme your keys! |
2014-06-10/a> | Daniel Wesemann | Sampling Bias |
2014-04-24/a> | Rob VandenBrink | Apple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203 |
2014-04-11/a> | Guy Bruneau | Heartbleed Fix Available for Download for Cisco Products |
2014-04-07/a> | Johannes Ullrich | Attack or Bad Link? Your Guess? |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2014-01-13/a> | Johannes Ullrich | Special Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650 |
2014-01-11/a> | Guy Bruneau | tcpflow 1.4.4 and some of its most Interesting Features |
2013-12-24/a> | Daniel Wesemann | Unfriendly crontab additions |
2013-11-02/a> | Rick Wanner | Protecting Your Family's Computers |
2013-10-04/a> | Pedro Bueno | CSAM: WebHosting BruteForce logs |
2013-09-05/a> | Rob VandenBrink | What's Next for IPS? |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-06-25/a> | Bojan Zdrnja | The race for resources |
2013-06-10/a> | Johannes Ullrich | When Google isn't Google |
2013-04-08/a> | Johannes Ullrich | Cleaning Up After the Leak: Hiding exposed web content |
2013-03-26/a> | Daniel Wesemann | How your Webhosting Account is Getting Abused |
2013-02-25/a> | Johannes Ullrich | Punkspider enumerates web application vulnerabilities |
2013-02-22/a> | Johannes Ullrich | When web sites go bad: bible . org compromise |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2012-10-26/a> | Adam Swanger | Securing the Human Special Webcast - October 30, 2012 |
2012-09-08/a> | Guy Bruneau | Webmin Input Validation Vulnerabilities |
2012-08-13/a> | Rick Wanner | Interesting scan for medical certification information... |
2012-07-23/a> | Johannes Ullrich | Most Anti-Privacy Web Browsing Tool Ever? |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-12-28/a> | Daniel Wesemann | Hash collisions vulnerability in web servers |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-10-12/a> | Adam Swanger | We are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved. |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-05-17/a> | Johannes Ullrich | A Couple Days of Logs: Looking for the Russian Business Network |
2011-05-14/a> | Guy Bruneau | Websense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity |
2011-05-11/a> | Swa Frantzen | Time to disable WebGL ? |
2011-04-10/a> | Raul Siles | Recent security enhancements in web browsers (e.g. Google Chrome) |
2011-04-01/a> | John Bambenek | LizaMoon Mass SQL-Injection Attack Infected at least 500k Websites |
2011-02-28/a> | Deborah Hale | Possible Botnet Scanning |
2011-02-01/a> | Lenny Zeltser | The Importance of HTTP Headers When Investigating Malicious Sites |
2010-12-18/a> | Raul Siles | Google Chrome (Stable and Beta) have been updated to 8.0.552.224 for all platforms (Chrome OS too). http://bit.ly/fW04cr |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-12-02/a> | Kevin Johnson | Robert Hansen and our happiness |
2010-11-18/a> | Chris Carboni | All of your pages are belonging to us |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-08-13/a> | Tom Liston | The Strange Case of Doctor Jekyll and Mr. ED |
2010-07-25/a> | Rick Wanner | Updated version of Mandiant's Web Historian |
2010-07-21/a> | Adrien de Beaupre | Update on .LNK vulnerability |
2010-07-20/a> | Manuel Humberto Santander Pelaez | LNK vulnerability now with Metasploit module implementing the WebDAV method |
2010-06-23/a> | Scott Fendley | Opera Browser Update |
2010-06-15/a> | Manuel Humberto Santander Pelaez | iPhone 4 Order Security Breach Exposes Private Information |
2010-04-26/a> | Raul Siles | Vulnerable Sites Database |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-03-24/a> | Johannes Ullrich | ".sys" Directories Delivering Driveby Downloads |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-02-06/a> | Guy Bruneau | Oracle WebLogic Server Security Alert |
2010-02-03/a> | Johannes Ullrich | Anatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/ |
2010-01-29/a> | Johannes Ullrich | Analyzing isc.sans.org weblogs, part 2, RFI attacks |
2010-01-25/a> | William Salusky | "Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!" |
2010-01-20/a> | Johannes Ullrich | Weathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com |
2010-01-08/a> | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-12-28/a> | Johannes Ullrich | 8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug) |
2009-10-26/a> | Johannes Ullrich | Web honeypot Update |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-10-09/a> | Rob VandenBrink | THAWTE to discontinue free Email Certificate Services and Web of Trust Service |
2009-09-18/a> | Jason Lam | Results from Webhoneypot project |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-08-18/a> | Deborah Hale | Domain tcpdump.org unavailable |
2009-08-18/a> | Deborah Hale | Website compromises - what's happening? |
2009-08-17/a> | Adrien de Beaupre | YAMWD: Yet Another Mass Web Defacement |
2009-08-01/a> | Deborah Hale | Website Warnings |
2009-07-13/a> | Adrien de Beaupre | Vulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution |
2009-07-05/a> | Bojan Zdrnja | More on ColdFusion hacks |
2009-06-11/a> | Jason Lam | Dshield Web Honeypot going beta |
2009-05-27/a> | donald smith | WebDAV write-up |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-24/a> | Raul Siles | IIS admins, help finding WebDAV remotely using nmap |
2009-05-21/a> | Adrien de Beaupre | IIS admins, help finding WebDAV |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-05-05/a> | Bojan Zdrnja | Every dot matters |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-03-26/a> | Mark Hofman | Webhoneypot fun |
2009-02-17/a> | Jason Lam | DShield Web Honeypot - Alpha Preview Release |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-12-01/a> | Jason Lam | Call for volunteers - Web Honeypot Project |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
2008-09-08/a> | Raul Siles | Quick Analysis of the 2007 Web Application Security Statistics |
2008-08-19/a> | Johannes Ullrich | A morning stroll through my web logs |
2008-08-15/a> | Jim Clausing | WebEx ActiveX buffer overflow |
2008-06-07/a> | Jim Clausing | Followup to 'How do you monitor your website?' |
2008-04-24/a> | donald smith | Hundreds of thousands of SQL injections |
2006-09-30/a> | Swa Frantzen | Yellow: WebViewFolderIcon setslice exploit spreading |
APPLICATION |
2020-07-24/a> | Xavier Mertens | Compromized Desktop Applications by Web Technologies |
2019-06-20/a> | Xavier Mertens | Using a Travel Packing App for Infosec Purpose |
2018-12-31/a> | Didier Stevens | Software Crashes: A New Year's Resolution |
2018-04-30/a> | Remco Verhoef | Another approach to webapplication fingerprinting |
2014-08-09/a> | Adrien de Beaupre | Complete application ownage via Multi-POST XSRF |
2014-01-17/a> | Russ McRee | Massive RFI scans likely a free web app vuln scanner rather than bots |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-01-25/a> | Johannes Ullrich | Vulnerability Scans via Search Engines (Request for Logs) |
2011-11-01/a> | Russ McRee | Secure languages & frameworks |
2011-08-16/a> | Johannes Ullrich | What are the most dangerous web applications and how to secure them? |
2011-07-28/a> | Johannes Ullrich | Announcing: The "404 Project" |
2011-07-05/a> | Raul Siles | Helping Developers Understand Security - Spot the Vuln |
2011-04-22/a> | Manuel Humberto Santander Pelaez | In-house developed applications: The constant headache for the information security officer |
2010-12-25/a> | Manuel Humberto Santander Pelaez | An interesting vulnerability playground to learn application vulnerabilities |
2010-12-12/a> | Raul Siles | New trend regarding web application vulnerabilities? |
2010-08-16/a> | Raul Siles | Blind Elephant: A New Web Application Fingerprinting Tool |
2010-08-15/a> | Manuel Humberto Santander Pelaez | Python to test web application security |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Rogue facebook application acting like a worm |
2010-04-13/a> | Adrien de Beaupre | Web App Testing Tools |
2010-04-06/a> | Daniel Wesemann | Application Logs |
2010-03-21/a> | Scott Fendley | Skipfish - Web Application Security Tool |
2010-03-08/a> | Raul Siles | Samurai WTF 0.8 |
2010-02-20/a> | Mari Nichols | Is "Green IT" Defeating Security? |
2010-01-29/a> | Adrien de Beaupre | Neo-legacy applications |
2010-01-24/a> | Pedro Bueno | Outdated client applications |
2009-10-20/a> | Raul Siles | WASC 2008 Statistics |
2009-09-16/a> | Raul Siles | Review the security controls of your Web Applications... all them! |
2009-05-26/a> | Jason Lam | A new Web application security blog |
2009-05-20/a> | Tom Liston | Web Toolz |
2009-04-21/a> | Bojan Zdrnja | Web application vulnerabilities |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |
FIREWALL |
2025-02-06/a> | Johannes Ullrich | My Very Personal Guidance and Strategies to Protect Network Edge Devices |
2021-02-15/a> | Johannes Ullrich | Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat |
2021-02-13/a> | Guy Bruneau | Using Logstash to Parse IPtables Firewall Logs |
2020-09-17/a> | Xavier Mertens | Suspicious Endpoint Containment with OSSEC |
2019-11-22/a> | Xavier Mertens | Abusing Web Filters Misconfiguration for Reconnaissance |
2019-03-05/a> | Rob VandenBrink | Powershell, Active Directory and the Windows Host Firewall |
2019-01-22/a> | Xavier Mertens | DNS Firewalling with MISP |
2018-12-19/a> | Xavier Mertens | Restricting PowerShell Capabilities with NetSh |
2018-09-22/a> | Didier Stevens | Suspicious DNS Requests ... Issued by a Firewall |
2017-08-23/a> | Xavier Mertens | Malicious script dropping an executable signed by Avast? |
2015-02-23/a> | Richard Porter | Subscribing to the DShield Top 20 on a Palo Alto Networks Firewall |
2013-10-18/a> | Rob VandenBrink | CSAM - Why am I seeing DNS Requests to IANA.ORG in my Firewall Logs? |
2013-07-27/a> | Scott Fendley | Defending Against Web Server Denial of Service Attacks |
2013-07-20/a> | Manuel Humberto Santander Pelaez | Do you have rogue Internet gateways in your network? Check it with nmap |
2013-04-25/a> | Adam Swanger | Guest Diary: Dylan Johnson - A week in the life of some Perimeter Firewalls |
2013-03-13/a> | Johannes Ullrich | IPv6 Focus Month: Kaspersky Firewall IPv6 Vulnerability |
2013-03-08/a> | Johannes Ullrich | IPv6 Focus Month: Filtering ICMPv6 at the Border |
2013-03-05/a> | Mark Hofman | IPv6 Focus Month: Device Defaults |
2012-05-17/a> | Johannes Ullrich | Do Firewalls make sense? |
2012-05-08/a> | Bojan Zdrnja | Windows Firewall Bypass Vulnerability and NetBIOS NS |
2011-07-15/a> | Deborah Hale | What's in a Firewall? |
2010-11-08/a> | Manuel Humberto Santander Pelaez | Network Security Perimeter: How to choose the correct firewall and IPS for your environment? |
2010-06-14/a> | Manuel Humberto Santander Pelaez | Another way to get protection for application-level attacks |
2010-03-10/a> | Rob VandenBrink | What's My Firewall Telling Me? (Part 4) |
2010-03-05/a> | Kyle Haugsness | What is your firewall log telling you - responses |
2010-03-03/a> | Daniel Wesemann | What is your firewall log telling you - Part #2 |
2010-02-23/a> | Mark Hofman | What is your firewall telling you and what is TCP249? |
2009-10-30/a> | Rob VandenBrink | New version of NIST 800-41, Firewalls and Firewall Policy Guidelines |
2009-01-12/a> | William Salusky | Web Application Firewalls (WAF) - Have you deployed WAF technology? |
2008-11-20/a> | Jason Lam | Large quantity SQL Injection mitigation |