<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security | RobWillis.info</title>
	<atom:link href="/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>#yolosec</description>
	<lastBuildDate>Tue, 22 Apr 2025 07:19:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Analyzing &#038; Detecting IIS Backdoors</title>
		<link>/2022/11/analyzing-detecting-iis-backdoors/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sat, 05 Nov 2022 08:00:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Detection]]></category>
		<category><![CDATA[Extensions]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Kali]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Web Shell]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=5452</guid>

					<description><![CDATA[<p>IIS Extensions As Backdoors Microsoft recently published an interesting blog explaining how they&#8217;ve noticed a new trend where attackers have been leveraging Internet Information Services (IIS) extensions to covertly backdoor Windows servers: https://www.microsoft.com/security/blog/2022/07/26/malicious-iis-extensions-quietly-open-persistent-backdoors-into-servers/ The Microsoft post contains a wealth of information on this topic, but I really wanted to dig through the specifics in order [&#8230;]</p>
The post <a href="/2022/11/analyzing-detecting-iis-backdoors/">Analyzing & Detecting IIS Backdoors</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Defending Against PowerShell Attacks</title>
		<link>/2021/02/defending-against-powershell-attacks/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 04:07:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AppLocker]]></category>
		<category><![CDATA[CLM]]></category>
		<category><![CDATA[JEA]]></category>
		<category><![CDATA[Logging]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=4971</guid>

					<description><![CDATA[<p>It&#8217;s no secret that I am a big fan of PowerShell and recently I have been spending a considerable amount of time researching and testing it from a security perspective. While there is a lot of solid information out there, I have found it can still be a challenge to really get a solid grasp [&#8230;]</p>
The post <a href="/2021/02/defending-against-powershell-attacks/">Defending Against PowerShell Attacks</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Gathering Windows, PowerShell and Sysmon Events with Winlogbeat &#8211; ELK 7 &#8211; Windows Server 2016 (Part II)</title>
		<link>/2019/05/gathering-windows-powershell-and-sysmon-events-with-winlogbeat-elk-7-windows-server-2016/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Tue, 07 May 2019 02:43:19 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[2016]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Winlogbeat]]></category>
		<guid isPermaLink="false">/?p=4162</guid>

					<description><![CDATA[<p>In part I of this series, Installing ELK 7 (Elasticsearch, Logstash and Kibana) on Windows Server 2016, I covered the following: Installing and configuring Elasticsearch, Logstash, and Kibana as Windows services Installing and configuring Winlogbeat to forward logs from the ELK server into ELK Installing and configuring Curator as a scheduled task (optional) Now, in [&#8230;]</p>
The post <a href="/2019/05/gathering-windows-powershell-and-sysmon-events-with-winlogbeat-elk-7-windows-server-2016/">Gathering Windows, PowerShell and Sysmon Events with Winlogbeat – ELK 7 – Windows Server 2016 (Part II)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Installing ELK 7 (Elasticsearch, Logstash and Kibana) &#8211; Windows Server 2016 (Part I)</title>
		<link>/2019/05/installing-elk-7-elasticsearch-logstash-and-kibana-windows-server-2016/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Tue, 07 May 2019 02:42:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[PowerShell/Scripting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[2016]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Sysmon]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Winlogbeat]]></category>
		<guid isPermaLink="false">/?p=4058</guid>

					<description><![CDATA[<p>I am a huge fan of the Elastic stack as it can provide a great deal of visibility into even the largest of environments, which can help enable both engineering and security teams rapidly triage technical issues or incidents at scale. There&#8217;s also the fact that unlike Splunk, the Elastic software is free to use [&#8230;]</p>
The post <a href="/2019/05/installing-elk-7-elasticsearch-logstash-and-kibana-windows-server-2016/">Installing ELK 7 (Elasticsearch, Logstash and Kibana) – Windows Server 2016 (Part I)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Home Lab Cooling Upgrade!</title>
		<link>/2018/10/home-lab-cooling-upgrade/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Mon, 29 Oct 2018 03:24:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Cooling]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[pfSense]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3979</guid>

					<description><![CDATA[<p>In this video I show off my latest project &#8211; Upgrading the cooling system on my home lab in hopes of making it a little more efficient while quieting things down a bit. The original setup consisted of the following: 2 x 6&#8243; Ducts with Fans 6&#8243; Flexible Ducting Originally there was just a single [&#8230;]</p>
The post <a href="/2018/10/home-lab-cooling-upgrade/">Home Lab Cooling Upgrade!</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>My Journey Into The OSCP</title>
		<link>/2018/07/my-journey-into-the-oscp/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 13 Jul 2018 13:28:40 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Offensive Security Certified Professional]]></category>
		<category><![CDATA[OSCP]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">/?p=3745</guid>

					<description><![CDATA[<p>Intro This post is going to break away from my typical technical how-to style posts, and talk a little bit about something that has been a personal goal of mine for some time – The Offensive Security Certified Professional. When it comes to even thinking about enrolling in the OSCP, most people will question if [&#8230;]</p>
The post <a href="/2018/07/my-journey-into-the-oscp/">My Journey Into The OSCP</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Home Lab Setup (2017)</title>
		<link>/2018/02/home-lab-setup/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Sun, 04 Feb 2018 15:51:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Pen Testing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[blue]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[Home Lab]]></category>
		<category><![CDATA[IDS]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[OPNsense]]></category>
		<category><![CDATA[pfSense]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[snort]]></category>
		<category><![CDATA[team]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3508</guid>

					<description><![CDATA[<p>In this post and video I give a quick run down of my Home Lab &#8211; everything from the rack itself, to the hardware and the basics of what everything is being used for. I started this project towards the end of 2012 with a single Dell PowerEdge 2950 GII and was hoping to teach [&#8230;]</p>
The post <a href="/2018/02/home-lab-setup/">Home Lab Setup (2017)</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>ELK Stack &#8211; Installing and Configuring Curator</title>
		<link>/2017/11/elk-stack-installing-and-configuring-curator/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 16 Nov 2017 15:42:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[Curator]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3462</guid>

					<description><![CDATA[<p>In this post I am going to quickly cover what is needed to get Curator up and running on the ELK stack. In the last few posts about the ELK stack I covered everything needed to get it installed, configured and ingesting logs reliably. If you missed those posts, you can find them here: ELK [&#8230;]</p>
The post <a href="/2017/11/elk-stack-installing-and-configuring-curator/">ELK Stack – Installing and Configuring Curator</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>ELK Stack &#8211; Tips, Tricks and Troubleshooting</title>
		<link>/2017/11/elk-stack-tips-tricks-and-troubleshooting/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Fri, 10 Nov 2017 02:55:43 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Computers]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3394</guid>

					<description><![CDATA[<p>This post is going to be a sort of a follow up to my ELK 5 on Ubuntu 16.04 series. I am going to cover some of the lessons I have learned over the last few months of maintaining a running ELK stack instance. I am also going to cover some one liners that can [&#8230;]</p>
The post <a href="/2017/11/elk-stack-tips-tricks-and-troubleshooting/">ELK Stack – Tips, Tricks and Troubleshooting</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>ELK 5: Setting up a Grok filter for IIS Logs</title>
		<link>/2017/05/elk-5-setting-up-a-grok-filter-for-iis-logs/</link>
		
		<dc:creator><![CDATA[robwillisinfo]]></dc:creator>
		<pubDate>Thu, 11 May 2017 14:47:05 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[Elastic]]></category>
		<category><![CDATA[Elasticsearch]]></category>
		<category><![CDATA[ELK]]></category>
		<category><![CDATA[Grok]]></category>
		<category><![CDATA[IIS]]></category>
		<category><![CDATA[Kibana]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Logs]]></category>
		<category><![CDATA[Logstash]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">/?p=3171</guid>

					<description><![CDATA[<p>In Pt. 3 of my setting up ELK 5 on Ubuntu 16.04 series, I showed how easy it was to ship IIS logs from a Windows Server 2012 R2 using Filebeat. One thing you may have noticed with that configuration is that the logs aren&#8217;t parsed out by Logstash, each line from the IIS log [&#8230;]</p>
The post <a href="/2017/05/elk-5-setting-up-a-grok-filter-for-iis-logs/">ELK 5: Setting up a Grok filter for IIS Logs</a> first appeared on <a href="/">RobWillis.info</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
