neonprimetime security , just trying to help

Tuesday, May 31, 2016

Open Proxy Requests

›
If you see any requests in your web logs, IDS, and WAF that have full urls in the HTTP GET request, you may wonder, what on earth is that? ...

SQL Injection Attack Sample

›
Saw this SQL Injection attempt, could not find much about it, so I thought I'd document it here a bit. I believe from some google searc...

A File Upload Vulnerability barrage

›
I noticed a series of Wordpress/Joomla file upload attacks from a single IP address / attacker in a short period of time. Some of the reques...
1 comment:

Email Attachment Word Doc with VBA

›
I recently saw an email in French that was phishing a user to click on an invoice. The email looked like this below (I attempted to google ...
1 comment:

Javascript Attachment executing a Payload

›
Saw the following malicious email this week. The subject was "Internal Company Information Notice". The body of the email told t...
Friday, May 27, 2016

Angler, GZIP, and a Landing Page

›
The Malware Traffic Analysis blog is awesome, it contains many live samples of malicious traffic for your inspecting pleasure. Today I thou...
2 comments:
Thursday, May 26, 2016

Analyzing Some UDP Packets

›
I thought it'd be interesting to just walk through the analysis of a set of harmless UDP packets, to get a feel for basic 101 packet ins...
‹
›
Home
View web version
Powered by Blogger.