To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.


Current Status of Ghost

As the first half of the HP summer of code has passed, I'd like to give a short update on the current status of the Ghost USB honeypot. Read more »

HoneyProxy HTTP/HTTPS - Beta Release

At the middle of GSoC 2012, we are happy and proud to release a beta version of HoneyProxy, a lightweight tool that allows live HTTP and HTTPS traffic inspection and analysis.

Unlike other network tools like WireShark that display flow packet by packet, HoneyProxy only displays application layer data. Web objects then can be viewed through a browser. Read more »

AfterGlow Cloud: Initial release

With the marking of the mid-term milestone in GSoC 2012, we're happy to announce a first version release of AfterGlow Cloud. After a lot of discussions and review the project seems to be in a good position for an initial release. The project in essential is based on AfterGlow [1], a security visualization tool which facilitates generating visual graphs from data you upload. The tool described at [1] is originally command-line based, the aim of this project, in general is to bring this tool and its options to the cloud -- so as to provide a neat interface for on-the-fly visualizations. Read more »

Synchronous Communication between Kernel and User Space

In this post I'd like to describe some aspects of the communication between kernel and user mode in the Ghost USB honeypot. More specifically, I'll focus on how to realize blocking communication with the Windows Driver Frameworks (WDF). Read more »

Forensic Challenge 11 - "Dive Into Exploit" - Submission Deadline Passed

the submission deadline for the Forensic Challenge 11 "Dive Into Exploit" created by Georg Wicherski from Giraffe Chapter has passed.

We have received 2 good submissions and will be announcing results before the end of July. Without doubt, this challenge was one of the most difficult ones the Honeynet Project provided in the last years so we are really glad about the submitted solutions which seems really high-level at a first glance.

Angelo Dell'Aera
The Honeynet Project

Interesting Reads: Monday 25th June

Another Monday has been and gone (on this side of the world at least). I thought I'd sit down again and share some of the interestingness (yes, that's a word now) that came through my various news feeds over the course of the weekend. I'm hoping this week will be a little less malware focused, but I can't make any promises.

news.source == "twitter"

@mboman: New blog post: MART - Malware Analyst Research Toolkit: Cuckoo Sandbox: Read more »

Open Source Licensing Madness

Before we released the Ghost USB honeypot as open source software, we had quite some trouble to apply the GPL to our case. Since there wasn't much information available for the very particular case of using the GPL for a Windows driver, I'll discuss our issues and solutions in this article. This might not directly be applicable to other software, but it should provide the reader with general insights and will hopefully help people to sort out similar problems in the future. Read more »

Interesting Reads: Monday 18th June

Good evening/morning folks.

It's been fairly busy here at HNP HQ for a number of reasons. That said, there were a number of interesting articles over the weekend I thought I'd hilight here for your reading pleasure. This week seems to be a week of malware so we will stick with that theme.


Malware Hunting with the Sysinternals Tools (video)

Read more »

Ghost USB honeypot released

I'm very pleased to announce that we have released the first public version of the Ghost USB honeypot.

Ghost is a honeypot for malware that uses USB storage devices for propagation. It is able to capture such malware without any further knowledge - especially, it doesn't need signatures or the like to accomplish its task.

Detection is achieved by emulating a USB flash drive on Windows systems and observing the emulated device. The assumption is that on an infected machine the malware will eventually copy itself to the removable device. Read more »

Forensic Challenge 11 - "Dive Into Exploit" - Deadline Extended

Taking a look at the submissions we realized that... mmh no submissions at all... We already knew that solving this challenge requires high skills but it seems like more time is needed in order to solve the Forensic Challenge 11 - "Dive Into Exploit". For this reason we decided to extend the submission deadline to 2012, July 1st.

Have fun (and don't be shy)!

Angelo Dell'Aera
The Honeynet Project

Syndicate content