Recent posts

TypePostAuthorRepliesLast updated
Book pageAPPENDIX B: The Infection Process jamie.riden09 years 1 day ago
Book pageAPPENDIX A: Fast-Flux Proxy Samples jamie.riden09 years 1 day ago
Book pageAPPENDICES jamie.riden09 years 1 day ago
Book pageACKNOWLEDGEMENTS jamie.riden09 years 1 day ago
Book pageSUMMARY jamie.riden09 years 1 day ago
Book pageDETECTION & MITIGATION jamie.riden09 years 1 day ago
Book pageSTATISTICS jamie.riden09 years 1 day ago
ImageFlux HTTP pie jamie.riden09 years 1 day ago
ImageFlux DNS pie jamie.riden09 years 1 day ago
Book pageFAST-FLUX CASE STUDY jamie.riden09 years 1 day ago
Book pageFAST-FLUX MALWARE jamie.riden09 years 1 day ago
Book pageREAL WORLD FAST-FLUX EXAMPLES jamie.riden09 years 1 day ago
Book pageADVANTAGES FOR THE ATTACKER jamie.riden09 years 1 day ago
Book pageSINGLE-FLUX NETWORKS jamie.riden09 years 1 day ago
Book pageDOUBLE-FLUX SERVICE NETWORKS jamie.riden09 years 1 day ago
ImageFast flux DNS diagram jamie.riden09 years 1 day ago
Book pageHOW FAST-FLUX SERVICE NETWORKS WORK jamie.riden09 years 1 day ago
ImageFast flux web diagram jamie.riden09 years 1 day ago
Book pageDetailed analysis of two phishing incidents drupal09 years 1 day ago
Book pageHoneysnap sample output drupal09 years 1 day ago
Book pageRedirected Phishing Victims drupal09 years 1 day ago
Book pageGerman PHP script analysis drupal09 years 1 day ago
Book pageAnalysis of German attacker's sessions drupal09 years 1 day ago
Book pageDetails of German compromise drupal09 years 1 day ago
Book pageSetup and Timeline for UK Honeynet Project Phishing Incident drupal09 years 1 day ago