tekdefense.com
TekDefense - News - Network Challenge - 001 - Linux
http://www.tekdefense.com/news/2016/9/16/network-challenge-001-linux.html
Network Challenge - 001 - Solution. Network Challenge - 001 - Linux. Automater Update .21. BSidesNola 2015 Presentation on Honeypots. Over a year with Kippo. Automater version 2.1 released - Proxy capabilities and a little user-agent modification. Memory Forensics presentation from BSidesNola. Analyzing DarkComet in Memory. Automater Output Format and Modifications. Laquo; Network Challenge - 001 - Solution. Automater Update .21 ». Network Challenge - 001 - Linux. Friday, September 16, 2016 at 9:04AM.
tekdefense.com
TekDefense - News
http://www.tekdefense.com/news/month/september-2016
Network Challenge - 001 - Solution. Network Challenge - 001 - Linux. Automater Update .21. BSidesNola 2015 Presentation on Honeypots. Over a year with Kippo. Automater version 2.1 released - Proxy capabilities and a little user-agent modification. Memory Forensics presentation from BSidesNola. Analyzing DarkComet in Memory. Automater Output Format and Modifications. Entries from September 1, 2016 - September 30, 2016. Network Challenge - 001 - Linux. Friday, September 16, 2016 at 9:04AM. Determine what l...
discover.profitstars.com
Strategically Speaking | Strategically Speaking
http://discover.profitstars.com/strategicallyspeaking/author/strategically-speaking
Strategically Speaking Has Moved! On Tue, Apr 05, 2016 @ 02:03 PM. Strategically Speaking will now be published under the Jack Henry and Associates branding. You can visit and subscribe to the new Strategically Speaking here. Thank you for your support and we hope to see you over at the new website! 0 Comments Click here to read/write comments. Secure Your People, Secure the Future. On Wed, Dec 30, 2015 @ 09:30 AM. Author: June Middleton,. If only I had a dollar for every time I have heard or read ‘.
discover.profitstars.com
Strategically Speaking | cybersecurity
http://discover.profitstars.com/strategicallyspeaking/topic/cybersecurity
Secure Your People, Secure the Future. On Wed, Dec 30, 2015 @ 09:30 AM. Author: June Middleton,. Due to the recent high-profile security breaches at a myriad of companies, security spending propelled to the top of their IT priority list for 2015. If organizations have continued to increase IT security spending, then why are the bad guys still getting in? If only I had a dollar for every time I have heard or read ‘. The human is the weakest link in IT security. Over the past 12 months. Mentions that Analy...
isc.sans.edu
Archived .vbe attachments in malspam - SANS Internet Storm Center
https://isc.sans.edu/forums/Archived+vbe+attachments+in+malspam/953
Handler on Duty: Johannes Ullrich. SANS ISC: Archived .vbe attachments in malspam - SANS Internet Storm Center. Other SANS Sites Help. SANS ISC InfoSec Forums. Sign Up for Free! Or Sign Up for Free. Larr; Next Thread. Previous Thread →. Archived .vbe attachments in malspam. Here's a recent email conversation I thought I'd share:. Sent: Tuesday, August 4, 2015 18:48 UTC. Hi Brad - I'm a huge fan of the research you do and follow you on twitter. Interested in a sample that we received today? The vbe-based ...
capanalysis.net
News | CapAnalysis | PCAP from another point of view
http://www.capanalysis.net/ca/news
CREATE A NEW DATASET. Posted on 12th April 2016. What if you find a PCAP file on the web and want to upload it? You don’t need to download it first. You can simply paste the URL of a publicly available PCAP into the widget “Import from URL”. This is also true if the PCAP file is in a ZIP archive, such as those provided by Malware-Traffic-Analysis.net. Try this new feature here. Posted on 2nd January 2016. CapAnalysis is now open source! Posted on 21st January 2015. Try CapAnalysis right now! This website...
labs.nettitude.com
An analysis of the RIG exploit kit – Nettitude Labs
https://labs.nettitude.com/blog/an-analysis-of-the-rig-exploit-kit
Microsoft Logparser Query Files. Blog - Latest News. An analysis of the RIG exploit kit. An analysis of the RIG exploit kit. Thursday 27 October 2016. Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This happened shortly after a major malvertising campaign, that delivered the same ransomware via the Neutrino exploit kit, was shut down by Cisco’s Talos Security Intelligence and Research Group earlier this month [1]. RIG Exploit Kit Overview.
rattis.net
Digital Forensics | Chris J | Cybersecurity and Other Rambles
https://rattis.net/category/digital-forensics
Chris J Cybersecurity and Other Rambles. Infosec from @rattis' point of view. Chris J’s Resume. Category Archives: Digital Forensics. Script(s) to extract HTTP Host data from file. A while ago, created a new repository on GitHub for the scripts I wrote for DFIR. Since then, it only had the Computer Ping script. In it Today I added the first of the Extractor scripts. Continue reading →. This entry was posted in CIRT. And tagged Digital Forensics. Script(s) to ping a computer. 1 version for boxes running L...
rattis.net
IR | Chris J | Cybersecurity and Other Rambles
https://rattis.net/category/ir
Chris J Cybersecurity and Other Rambles. Infosec from @rattis' point of view. Chris J’s Resume. Script(s) to extract HTTP Host data from file. A while ago, created a new repository on GitHub for the scripts I wrote for DFIR. Since then, it only had the Computer Ping script. In it Today I added the first of the Extractor scripts. Continue reading →. This entry was posted in CIRT. And tagged Digital Forensics. Different ways to use TOR. While catching up on SANS’ Internet Storm Center Storm Cast. And start...
rattis.net
tools | Chris J | Cybersecurity and Other Rambles
https://rattis.net/tag/tools
Chris J Cybersecurity and Other Rambles. Infosec from @rattis' point of view. Chris J’s Resume. Script(s) to extract HTTP Host data from file. A while ago, created a new repository on GitHub for the scripts I wrote for DFIR. Since then, it only had the Computer Ping script. In it Today I added the first of the Extractor scripts. Continue reading →. This entry was posted in CIRT. And tagged Digital Forensics. Different ways to use TOR. While catching up on SANS’ Internet Storm Center Storm Cast. In the tw...
SOCIAL ENGAGEMENT