Date Author Title
2024-10-17Guy BruneauScanning Activity from Subnet 15.184.0.0/16
2024-09-11Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-08-30Jesse La GrewSimulating Traffic With Scapy
2024-02-03Guy BruneauDShield Sensor Log Collection with Elasticsearch
2023-01-02Xavier MertensNetworkMiner 2.8 Released
2022-01-25Brad DuncanEmotet Stops Using 0.0.0.0 in Spambot Traffic
2021-11-07Didier StevensVideo: Decrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-11-06Didier StevensDecrypting Cobalt Strike Traffic With Keys Extracted From Process Memory
2021-10-25Didier StevensDecrypting Cobalt Strike Traffic With a "Leaked" Private Key
2021-04-10Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2020-12-03Brad DuncanTraffic Analysis Quiz: Mr Natural
2020-11-11Brad DuncanTraffic Analysis Quiz: DESKTOP-FX23IK5
2018-11-18Guy BruneauMultipurpose PCAP Analysis Tool
2016-05-14Guy BruneauINetSim as a Basic Honeypot
2015-03-16Johannes UllrichAutomatically Documenting Network Connections From New Devices Connected to Home Networks
2013-12-02Richard PorterReports of higher than normal SSH Attacks
2013-03-09Guy BruneauIPv6 Focus Month: IPv6 Encapsulation - Protocol 41
2013-02-03Lorna HutchesonIs it Really an Attack?
2012-08-30Bojan ZdrnjaAnalyzing outgoing network traffic (part 2)
2012-08-23Bojan ZdrnjaAnalyzing outgoing network traffic
2011-01-15Jim ClausingWhat's up with port 8881?
2009-01-21Raul SilesTraffic increase for port UDP/8247