General

  • Target

    The Practice of Network Security Monitoring Understanding Incident Detection and Response (Richard Bejtlich) (z-lib.org).pdf

  • Size

    17.4MB

  • MD5

    6fe502a5b5e89925110b933071282b4e

  • SHA1

    937c34e6095233d6ee4df21e6e45c6910a4962d4

  • SHA256

    60511c442b2bfcb69a91c75aa165409dd879f9b998fa2879ab9a706f5413eeb4

  • SHA512

    96d5ef07e48a3feab4074ce25735f56a800e1df0ad9aef4d5e78da39c7abde15afc388f57aadb53811830bed4f810bb2e03f279d6c5793bb71fd05e84f800773

  • SSDEEP

    393216:gsAFsLMzWyB6PKVVInOD2t9rA18OScqTcM:gy8WyB6S/2t+Evv

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • The Practice of Network Security Monitoring Understanding Incident Detection and Response (Richard Bejtlich) (z-lib.org).pdf
    .pdf
    • http://www.amazon.com/Joel-Scambray/e/B001IR3C4U/ref=ntt_athr_dp_pel_2

    • http://www.amazon.com/George-Kurtz/e/B001ITTL6Q/ref=ntt_athr_dp_pel_3

    • http://www.robtex.com

    • http://www.testmyids.com

    • http://taosecurity.blogspot.com/2011/12/become-hunter.html

    • http://nostarch.com

    • http://taosecurity.blogspot.com

    • http://www.taosecurity.com/bejtlich_visscher_techtarget_webcast_4_dec_02.ppt

    • http://securityonion.blogspot.com

    • Show all