To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.

Blogs

Detecting Conficker

As you know, bad things are going to happen on April 1st: people will be sending out emails to their friends, telling silly jokes and putting MTAs under a higher load. Besides that (but not quite that bad), Conficker will activate its domain name generation routine to contact command-and-control servers. We have been researching this piece of malware recently, with a focus on how to detect Conficker-infected machines. Felix and I had a discussion with Dan Kaminsky about the possibilities to actively detect Conficker and wrote a scanner for this task.

GSoC Applications

Folks, just a friendly reminder that the Honeynet Project is actively seeking and taking students for the annual Google Summer of Code.  If you are interested in information security, open source and learning from some extremely talented developers in this area, then this is the place for you.  We currently have eight project ideas, but we are open to any suggestions or ideas you may have.  Learn more at our Honeynet Project GSoC Ideas Page.  Applications close on Friday, 03 April so you only have one week left.

GSoC Mentoring Organization

We are excited to announce that the Honeynet Project has been selected by Google to be a mentoring organization for their annual Google Summer of Code project.  Our team of volunteers is very excited about this and look forward to working with and helping mentor students around the world about honeypot technologies.  To learn more about the different projects you can work with us on, please take a moment to review our IDEAS PAGE.  If you will be submitting an application, your best chance to be selected is to take your tim

Data Link Security

Buffer overflow, cross site scripting and sql injection have had their share of the spotlight,
I have recently decided to give more attention to layer two issues and share my findings.

Some of the reasons that attracted me to layer two security is that there is a high percentage of 

Google Summer of Code

We are very excited to announce the Honeynet Project has applied for the Google Summer of Code for 2009.

Annual Honeynet Workshop

Once a year the Honeynet Project brings together members from around the world for a one week workshop on honeypot research, development and deployments.  This year's event was hosted and sponsored by the International Multilateral Partnership Against Cyber-Threats (IMPACT), a public-private alliance against cyber threats.  The event was held in IMPACT's facilities based in Cyberjaya, Malaysia.  Without a doubt, this was our most successful and productive workshop ever.  We had over twenty countries and organizations represented, all dedicat

Mexican Chapter - Annual Report

=== ORGANIZATION ===

The Mexican HP Chapter members are:
Miguel Hernández y López (miguel_at_honeynet.org.mx)
Hugo Gonzalez Robledo (hugo_at_honeynet.org.mx)

=== DEPLOYMENTS ===

* Capture HP deployment and a nepenthes sensor in several networks.
* Working with different government agencies in Argentina to implement Nepenthes sensors and honeynets Nepenthes within their networks

UNAM Chapter Blog

UNAM Chapter Status Report has been published.
More details

Speaking Waledac

While it seems to be impossible to say whether waledac is the successor of storm or not, what we can do is take a look at the traffic encryption. They guys over at Shadowserver have already blogged some details about this. We at the Giraffe Chapter investigated waledac's communication protocol further. Here are our results.

Picviz 0.5 out

The new release 0.5 of Picviz is out. This version comes with real-time mode enabled (and adds the libevent dependency) among other things, such as new properties and variables.

Get it from the usual place.

What is Picviz?

When considering log files for security, usual applications available today
either look for patterns using signature databases or use a behavioral
approach. In both cases, information can be missed. The problem becomes
bigger with systems receiving a massive amount of logs.

Syndicate content