Key tools and commands for analyzing malicious software on the REMnux Linux distribution:
This cheat sheet presents recommendations for creating a strong report as part of an information security assessment project.
Checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review, co-authored with Anton Chuvakin:
Tips and tools for reverse-engineering malicious documents, such as Microsoft Office (DOC, XLS, PPT) and Adobe Acrobat (PDF) files:
Tips for the initial design and review of a complex Internet application’s security architecture:
Communication tips for technologists, engineers, and information workers:
Tips for examining a potentially-compromised server to decide whether to escalate for formal incident response:
The questions the incident handler should consider asking when taking control of a qualified incident:
Advice for battling a network DDoS attack on your infrastructure:
Shortcuts and tips for analyzing malicious software:
Tips for planning, issuing and reviewing RFPs for information security assessments:
Common information security mistakes, so you can avoid making them:
A report template and framework for for capturing key details related to a large-scale intrusion and documenting them in a comprehensive, well-structured manner.