To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.


Thug and the art of web client tracking inspection

A few months ago I read the paper "Technical analysis of client identification mechanisms" [1]. The paper is really interesting and it is really worth investing your time and reading. Just a brief excerpt from the abstract: Read more »

Thug 0.6 released!

Thug 0.6 was released just a few hours ago. The most important change introduced during the 0.5 branch was a complete redesign of the logging infrastructure which is now completely modular. This makes adding (or removing) new logging modules extremely easy. Read more »

Meet the CEO

Angelo, you have been HNP CEO for more than over a year now. What were your goals when you started and did you achieve them?

First of all let me confess that it seems really incredible to me that a year has already gone by. I took over the CEO position for the Honeynet Project from Christian Seifert more than a year ago and at times the role appeared quite intimidating to me. Christian and Honeynet Project founder Lance Spitzner did an awesome job of driving the organization Read more »

Kippo fork - all in one


last week I published kippo fork
which contains commits from
(Michel Oosterhof brought awesome SFTP, and exec support)
and original kippo
(I am very pleased is now on github. was on google code before).

On top of that are my changes: Read more »

The new version of dorothy2 is out!

Howdy all,
The Italian Chapter is proud to release the latest version of dorothy2 (our ruby-based malware analysis framework) :). Read more »

Bifrozt - A high interaction honeypot solution for Linux based systems.

A few days ago I was contacted by our CPRO, Leon van der Eijk, and asked to write a blog post about my own project called Bifrozt; something which I was more than happy to do. :) This post will explain what Bifrozt is, how this got started, the overall status of the project and what will happen further down the road.

What is Bifrozt?
Read more »

Beeswarm - active deceptions made easy

Finally we can announce with great pleasure the first public beta of the Beeswarm project.
Beeswarm is an active IDS project that provides easy configuration, deployment and management of honeypots and clients. The project differentiates itself by two key items:

  • Active deceptions
  • Simplicity and ease of use

Active deceptions Read more »

Global Glastopf statistics for June 2014

During the month of June the following information was obtained from Glastopf installations worldwide

Geographical spread


10 most popular injected files during the period

Short introduction to RFI: Read more »

Get STIX Reports from ICS Honeypot Conpot

The team working on the ICS/SCADA honeypot Conpot, just merged in a more mature support for STIX (Structured Threat Information eXpression) formatted reporting via TAXII (Trusted Automated eXchange of Indicator Information) into the master branch on Github. Read more »

Syndicate content