Written by: Robert Wallace, Blas Kojusner, Joseph Dobson Where money goes, crime follows. The rapid growth of Web3 has presented new opportunities for threat actors, especially in decentralized finance (DeFi), where the heists are larger and
Continue ReadingMonth: September 2024
ISC Stormcast For Tuesday, September 3rd, 2024 https://isc.sans.edu/podcastdetail/9122, (Tue, Sep 3rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingProtected OOXML Text Documents, (Mon, Sep 2nd)
Just like "Protected OOXML Spreadsheets", Word documents can also be protected: You have to look into the word/settings.xml file, and search for element w:documentProtection: The hash algorithm is the same as for OOXML spreadsheets. However, you
Continue ReadingWireshark 4.4: Converting Display Filters to BPF Capture Filters, (Sun, Sep 1st)
Display filters are used to define expressions that decide which packets get displayed, and which not in Wireshark's packet list. Berkeley Packet Filter (BPF) expressions decide which packets get captured, and which not when Wireshark is
Continue Reading