Date Author Title
2024-10-03Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-09-25Guy BruneauOSINT - Image Analysis or More Where, When, and Metadata [Guest Diary]
2024-09-11Guy BruneauHygiene, Hygiene, Hygiene! [Guest Diary]
2024-09-04Guy Bruneau Attack Surface [Guest Diary]
2024-08-27Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-08-20Guy BruneauMapping Threats with DNSTwist and the Internet Storm Center [Guest Diary]
2024-08-07Guy BruneauSame Scripts, Different Day: What My DShield Honeypot Taught Me About the Importance of Security Fundamentals [Guest Diary]
2024-07-16Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2024-06-26Guy BruneauWhat Setting Live Traps for Cybercriminals Taught Me About Security [Guest Diary]
2024-06-13Guy BruneauThe Art of JQ and Command-line Fu [Guest Diary]
2024-05-28Guy BruneauIs that It? Finding the Unknown: Correlations Between Honeypot Logs & PCAPs [Guest Diary]
2024-05-22Guy BruneauAnalysis of ?redtail? File Uploads to ICS Honeypot, a Multi-Architecture Coin Miner [Guest Diary]
2024-04-07Guy BruneauA Use Case for Adding Threat Hunting to Your Security Operations Team. Detecting Adversaries Abusing Legitimate Tools in A Customer Environment. [Guest Diary]
2022-12-20Xavier MertensLinux File System Monitoring & Actions
2022-12-19Xavier MertensHunting for Mastodon Servers
2021-03-17Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2020-08-24Xavier MertensTracking A Malware Campaign Through VT
2020-01-25Guy BruneauIs Threat Hunting the new Fad?
2020-01-21Russ McReeDeepBlueCLI: Powershell Threat Hunting
2019-10-10Rob VandenBrinkMining Live Networks for OUI Data Oddness
2019-07-17Xavier MertensAnalyzis of DNS TXT Records
2019-03-27Xavier MertensRunning your Own Passive DNS Service
2018-11-20Xavier MertensQuerying DShield from Cortex
2018-10-17Russ McReeRedHunt Linux - Adversary Emulation, Threat Hunting & Intelligence
2018-09-20Xavier MertensHunting for Suspicious Processes with OSSEC
2018-08-10Remco VerhoefHunting SSL/TLS clients using JA3
2018-06-21Xavier MertensAre Your Hunting Rules Still Working?
2017-12-02Xavier MertensUsing Bad Material for the Good
2017-11-23Xavier MertensProactive Malicious Domain Search
2017-10-18Renato MarinhoBaselining Servers to Detect Outliers
2017-09-02Xavier MertensAutoIT based malware back in the wild
2017-03-15Xavier MertensRetro Hunting!
2016-07-12Xavier MertensHunting for Malicious Files with MISP + OSSEC