Behavioral task
behavioral1
Sample
Crafting the InfoSec Playbook Security Monitoring and Incident Response Master Plan (Jeff Bollinger,.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Crafting the InfoSec Playbook Security Monitoring and Incident Response Master Plan (Jeff Bollinger,.pdf
Resource
win10v2004-20220812-en
General
-
Target
Crafting the InfoSec Playbook Security Monitoring and Incident Response Master Plan (Jeff Bollinger, Brandon Enright etc.) (z-lib.org).pdf
-
Size
10.5MB
-
MD5
c24a98216b489d2172bf0070048f8598
-
SHA1
870d1fce6bc5e97788ffc4c6ae5e915d013c550e
-
SHA256
7d326481a8ede83bb4a5abeb8ef968a9e62ddc6434c77dd373c2a2ed0cecf82f
-
SHA512
e2380b2009995c16942d4d70a00fb3f194260c9b69c00241da7fdb91f746289f2534de01741047357c58548320673c8ffe7cf58eb2fcba461251cd6ae2a73772
-
SSDEEP
196608:RxFHxSY/zQmX4vRv0Nj5q+v9e7jjJIs7cJ2BvsiGIxcIjnRBB3p0p9L:LSsQmIZvwjvY73JIs4/iGWcIzpZkL
Malware Config
Signatures
Files
-
Crafting the InfoSec Playbook Security Monitoring and Incident Response Master Plan (Jeff Bollinger, Brandon Enright etc.) (z-lib.org).pdf.pdf
-
http://safaribooksonline.com
-
http://oreilly.com/catalog/errata.csp?isbn=9781491949405
-
https://www.safaribooksonline.com/explore/
-
https://www.safaribooksonline.com/pricing/
-
https://www.safaribooksonline.com/enterprise/
-
https://www.safaribooksonline.com/government/
-
https://www.safaribooksonline.com/academic-public-library/
-
https://www.safaribooksonline.com/our-library/
-
http://safaribooksonline.com/
-
http://bit.ly/crafting-infosec-playbook
-
http://www.oreilly.com
-
http://facebook.com/oreilly
-
http://twitter.com/oreillymedia
-
http://www.youtube.com/oreillymedia
-
http://www.informationweek.com/server-54-where-are-you/d/d-id/1010340
-
http://www.securityweek.com/how-syrian-electronic-army-pwned-some-internets-biggest-brands
-
https://www.pcisecuritystandards.org/
-
http://www.hhs.gov/ocr/privacy/
-
http://www.business.ftc.gov/privacy-and-security/gramm-leach-bliley-act
-
https://cloudsecurityalliance.org/
-
https://cloudsecurityalliance.org/research/ccm/
-
https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-1:v1:en
-
http://web.mit.edu/Saltzer/www/publications/protection/
-
http://dublincore.org/documents/dcq-rdf-xml/images/hedgehog.gif
-
http://en.cppreference.com/w/c/chrono/strftime
-
http://www.iso.org/iso/catalogue_detail?csnumber=40874
-
http://search.cpan.org/~drolsky/DateTime-Format-Strptime-1.54/lib/DateTime/Format/Strptime.pm
-
http://docs.python.org/2/library/datetime.html#strftime-strptime-behavior
-
http://tools.ietf.org/html/rfc5952
-
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?smid=pl-share
-
http://www.smartcompute.com/about-us/
-
http://www.southparkstudios.se/full-episodes/s02e17-gnomes
-
https://www.schneier.com/essays/archives/2000/04/the_process_of_secur.html
-
http://www.cisco.com/web/solutions/cloud/index.html
-
http://blogs.cisco.com/security/to-siem-or-not-to-siem-part-i/
-
http://www.informationweek.com/gartner-intrusion-detection-on-the-way-out/d/d-id/1019463?
-
http://www.ietf.org/rfc/rfc3954.txt
-
http://tools.ietf.org/html/rfc7011
-
https://tools.ietf.org/html/rfc5102
-
http://www.ietf.org/rfc/rfc6759.txt.pdf
-
http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/network-based-application-recognition-nbar/prod_case_study09186a00800ad0ca.html
-
https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/tech-briefs/techbrief-app-id.pdf
-
http://www.ntop.org/products/ndpi/
-
http://blogs.cisco.com/security/a-smorgasbord-of-denial-of-service/
-
http://nfdump.sourceforge.net/
-
http://www.cisco.com
-
http://blogs.cisco.com/security/tracking-malicious-activity-with-passive-dns-query-monitoring
-
http://www.infosecplaybook.com
-
https://archive.farsightsecurity.com/nmsgtool/
-
https://www.dns-oarc.net/tools/ncap
-
https://www.dnsdb.info/
-
http://www.idsoftware.com
-
http://www.idsoftware.com/gate.php
-
http://www.co-z-comfort.com
-
http://www.dhs.gov/national-terrorism-advisory-system
-
http://www.isaccouncil.org/memberisacs.html
-
https://www.us-cert.gov/sites/default/files/TLP.pdf
-
https://zeustracker.abuse.ch/blocklist.php?download=compromised
-
http://38.229.185.125/search?q=149
-
http://shop.oreilly.com/product/9780596528126.do
-
http://blog.spiderlabs.com/2012/04/a-new-neighbor-in-town-the-nuclear-pack-v20-exploit-kit.html
-
http://www.wired.com/2008/07/sf-city-charged/
-
http://www.cisco.com/c/dam/en/us/products/collateral/security/ios-network-foundation-protection-nfp/prod_white_paper0900aecd80313fac.pdf
-
http://www.cisco.com/web/about/security/intelligence/unicast-rpf.html
-
http://www.washingtonpost.com/blogs/the-switch/wp/2014/11/10/obama-to-the-fcc-adopt-the-strongest-possible-rules-on-net-neutrality-including-title-ii/
-
http://www.forbes.com/sites/gilpress/2014/08/22/internet-of-things-by-the-numbers-market-estimates-and-forecasts/
-
https://epic.org/crypto/export_controls/bernstein_decision_9_cir.html
-
http://www.wassenaar.org/controllists/
-
http://www.forbes.com/sites/samanthasharf/2014/08/05/target-shares-tumble-as-retailer-reveals-cost-of-data-breach/
-
http://animals.oreilly.com
-
http://www.it-ebooks.info/
- Show all
-