Analyzing PDF Streams, (Thu, May 9th)
LinkedIn Occasionaly, Xavier and Jim will ask me specific students’ questions about my tools...
Read MoreLinkedIn Occasionaly, Xavier and Jim will ask me specific students’ questions about my tools...
Read MoreSynology NAS solutions are popular devices. They are also used in many organizations. Their product range goes from small boxes with two disks (I’m not sure they still sell a single-disk enclosure today) up to monsters, rackable...
Read MoreISPs have a history of intercepting DNS. Often, DNS interception is done as part of a “value...
Read MoreA friend was having unexpected results with DNS queries on a Windows machine. I told him to use...
Read MoreBefore diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the devices affected by this vulnerability, produces various wireless equipment that is sometimes sold under different brands and...
Read MoreI reviewed a filename I see regularly uploaded to my DShield sensor eyshcjdmzg that have been...
Read MoreYesterday, I talked about attacks against a relatively recent D-Link NAS vulnerability. Today, scanning my honeypot logs, I found an odd URL that I didn’t recognize. The vulnerability is a bit older but turns out to be...
Read MoreEnd of March, NetworkSecurityFish disclosed a vulnerability in various D-Link NAS devices [1]. The...
Read MoreI’ve been working on comparing data from different DShield [1] honeypots to understand...
Read MoreA while back I got an email from Perry, one of our readers who was having a problem using my cvescan script, which I covered in a 3 part story back in 2021:...
Read MoreLike many similar frameworks and languages, Struts 2 has a “developer mode” (devmode)...
Read MoreIt has been nearly three years since we last looked at the number of industrial devices (or,...
Read More