Date Author Title

USER AGENT STRING

2018-01-01Didier StevensWhat is new?
2014-04-05Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2013-01-15Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...

USER

2024-10-16/a>Johannes UllrichThe Top 10 Not So Common SSH Usernames and Passwords
2024-02-28/a>Johannes UllrichExploit Attempts for Unknown Password Reset Vulnerability
2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-03-02/a>Russ McReeAdversary Simulation with Sim
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2019-07-05/a>Didier StevensA "Stream O" Maldoc
2019-07-01/a>Didier StevensMaldoc: Payloads in User Forms
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2018-01-01/a>Didier StevensWhat is new?
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2012-07-14/a>Tony CarothersUser Awareness and Education
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2011-08-26/a>Daniel WesemannUser Agent 007
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Tunnels - to Split or not to Split?
2010-10-19/a>Rob VandenBrinkCyber Security Awareness Month - Day 19 - Remote User VPN Access – Are things getting too easy, or too hard?
2009-05-28/a>Jim ClausingMore new volatility plugins
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields

AGENT

2024-04-17/a>Xavier MertensMalicious PDF File Used As Delivery Mechanism
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2023-08-23/a>Xavier MertensMore Exotic Excel Files Dropping AgentTesla
2023-07-01/a>Russ McReeSandfly Security
2021-12-31/a>Jan KoprivaDo you want your Agent Tesla in the 300 MB or 8 kB package?
2021-12-30/a>Brad DuncanAgent Tesla Updates SMTP Data Exfiltration Technique
2021-12-20/a>Jan KoprivaPowerPoint attachments, Agent Tesla and code reuse in malware
2021-11-18/a>Xavier MertensJavaScript Downloader Delivers Agent Tesla Trojan
2021-09-24/a>Xavier MertensKeep an Eye on Your Users Mobile Devices (Simple Inventory)
2021-06-30/a>Brad DuncanJune 2021 Forensic Contest: Answers and Analysis
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-11/a>Jan KoprivaAgent Tesla hidden in a historical anti-malware tool
2020-10-21/a>Daniel WesemannShipping dangerous goods
2020-05-23/a>Xavier MertensAgentTesla Delivered via a Malicious PowerPoint Add-In
2020-04-28/a>Jan KoprivaAgent Tesla delivered by the same phishing campaign for over a year
2020-03-11/a>Xavier MertensAgent Tesla Delivered via Fake Canon EOS Notification on Free OwnCloud Account
2019-11-27/a>Brad DuncanFinding an Agent Tesla malware sample
2019-09-19/a>Xavier MertensAgent Tesla Trojan Abusing Corporate Email Accounts
2018-12-19/a>Xavier MertensUsing OSSEC Active-Response as a DFIR Framework
2018-08-02/a>Brad DuncanDHL-themed malspam reveals embedded malware in animated gif
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2018-01-01/a>Didier StevensWhat is new?
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2012-06-25/a>Guy BruneauIssues with Windows Update Agent
2012-04-05/a>Johannes UllrichEvil hides everywhere: Web Application Exploits in Headers
2011-08-26/a>Daniel WesemannUser Agent 007
2011-07-13/a>Guy BruneauNew Sguil HTTPRY Agent
2010-02-17/a>Rob VandenBrinkCisco Security Agent Security Updates: cisco-sa-20100217-csa
2008-09-18/a>Bojan ZdrnjaMonitoring HTTP User-Agent fields

STRING

2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2022-06-23/a>Xavier MertensFLOSS 2.0 Has Been Released
2022-04-10/a>Didier StevensVideo: Method For String Extraction Filtering
2022-04-09/a>Didier StevensMethod For String Extraction Filtering
2021-11-25/a>Didier StevensYARA's Private Strings
2021-09-25/a>Didier StevensStrings Analysis: VBA & Excel4 Maldoc
2021-09-25/a>Didier StevensVideo: Strings Analysis: VBA & Excel4 Maldoc
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2021-01-01/a>Didier StevensStrings 2021
2020-10-25/a>Didier StevensVideo: Pascal Strings
2020-06-01/a>Jim ClausingStackstrings, type 2
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2018-12-09/a>Didier StevensQuickie: String Analysis is Still Useful
2018-01-01/a>Didier StevensWhat is new?
2014-04-05/a>Jim ClausingThose strange e-mails with URLs in them can lead to Android malware
2013-06-21/a>Guy BruneauSysinternals Updates for Autoruns, Strings & ZoomIt http://blogs.technet.com/b/sysinternals/archive/2013/06/20/updates-autoruns-v11-61-strings-v2-52-zoomit-v4-5.aspx
2013-05-20/a>Guy BruneauSysinternals Updates for Accesschk, Procdump, RAMMap and Strings http://blogs.technet.com/b/sysinternals/archive/2013/05/17/updates-accesschk-v5-11-procdump-v6-0-rammap-v1-22-strings-v2-51.aspx
2013-01-15/a>Rob VandenBrinkWhen Disabling IE6 (or Java, or whatever) is not an Option...
2007-01-03/a>Toby KohlenbergVLC Media Player udp URL handler Format String Vulnerability