nslookup’s Debug Options, (Sun, May 5th)
LinkedIn A friend was having unexpected results with DNS queries on a Windows machine. I told him...
Read MoreLinkedIn A friend was having unexpected results with DNS queries on a Windows machine. I told him...
Read MoreBefore diving into the vulnerability, a bit about the affected devices. LB-Link, the make of the devices affected by this vulnerability, produces various wireless equipment that is sometimes sold under different brands and...
Read MoreI reviewed a filename I see regularly uploaded to my DShield sensor eyshcjdmzg that have been...
Read MoreYesterday, I talked about attacks against a relatively recent D-Link NAS vulnerability. Today, scanning my honeypot logs, I found an odd URL that I didn’t recognize. The vulnerability is a bit older but turns out to be...
Read MoreEnd of March, NetworkSecurityFish disclosed a vulnerability in various D-Link NAS devices [1]. The...
Read MoreI’ve been working on comparing data from different DShield [1] honeypots to understand...
Read MoreA while back I got an email from Perry, one of our readers who was having a problem using my cvescan script, which I covered in a 3 part story back in 2021:...
Read MoreLike many similar frameworks and languages, Struts 2 has a “developer mode” (devmode)...
Read MoreIt has been nearly three years since we last looked at the number of industrial devices (or,...
Read MoreThe downloadable format of CVE’s from Miter will be changing in June 2024, so if you are using CVE downloads to populate your scanner, SIEM or to feed a SOC process, now would be a good time to look at that. If you are a...
Read MoreThe NVD (National Vulnerability Database) announcement page (https://nvd.nist.gov/general/news/nvd-program-transition-announcement) indicates a growing backlog of vulnerabilities that are causing delays in their process....
Read MoreBillions of PDF files are exchanged daily and many people trust them because they think the file...
Read More