The following diary was published on isc.sans.org: JavaScript Deobfuscation Tool.
[SANS ISC Diary] Virtual Bitlocker Containers
The following diary was published on isc.sans.org: Virtual Bitlocker Containers.
Refugees Need Some Help… Also From Techies!
Everybody is aware of the massive amount of refugees crossing Europe borders to try to find a better life. I won’t start a debate about this, it’s not the goal of this blog. But, when I was contacted by a friend who asked me if I could help some refugees
[SANS ISC Diary] Hunting for Juicy Information
The following diary was published on isc.sans.org: Hunting for Juicy Information.
The Truth is in Your Logs!
Keeping an eye on logs is boring… but mandatory! Hopefully, sometimes it can reveal funny stuffs! It looks like people at the CCC are having some fun too while their annual conference is ongoing… Here is what I got in my Apache logs this morning: 151.217.177.200 – – [30/Dec/2015:06:51:22 +0100]
Physical Access == Pwn3d!
This is becoming a buzz in Belgium in this holidays period and all media are busy to relay it: One of the biggest advertising panel in Brussels has been hacked! Sitting on top of a building, Place de Broeckere, it is well known from the people of Brussels. If it is
[SANS ISC Diary] Unity Makes Strength
The following diary was published on isc.sans.org: Unity Makes Strength
Managing Palo Alto Firewalls Custom URL Categories
Palo Alto Networks firewalls are very popular due to the huge amount of features they provide in a unique chassis. Besides the traditional traffic inspection, they can play up to the 7th layer of the ISO model. The rule base can contain rules which inspect the web traffic and prevent users
[SANS ISC Diary] Enforcing USB Storage Policy with PowerShell
The following diary was published on isc.sans.org:Â Enforcing USB Storage Policy with PowerShell
Email Tracking for Dummies
Recently, I was involved in an incident handling mission to find how some confidential emails were being tracked. Let’s imagine a first scenario: Alice sends a mail to Bob. Bob reads Alice’s email and Alice gets notified. Nothing special, this is a standard feature offered by most commercial messaging solutions.