To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.

Blogs

6Guard: a honeypot-based IPv6 attack detector

6Guard is a honeypot-based IPv6 attack detector aiming at detecting the link-local level attacks, especially when the port-mirror feature of switch is unavailable.

AREsoft-updater Released

AREsoft-updater is a simple updater script for Android Reverse Engineering Software belongs to Android Reverse Engineering (A.R.E.) Virtual Machine from the Honeynet Project

AREsoft-updater will check for the latest available version of each individual project/tool listed above and compare it with the local (installed) version in A.R.E. If newer version is available, AREsoft-updater will automatically download and install the update for your A.R.E

Beta Release of DroidBox for Android 2.3 and APIMonitor

I'm announcing the new features of Android dynamic analysis tool DroidBox as GSoC 2012 approaches the end. In this release, I would like to introduce two parts of my work: DroidBox porting and APIMonitor.

AfterGlow Cloud: Second release

AfterGlow cloud has evolved further into another release; with many improvements added to the initial version. With GSoC 2012 approaching an end, we've covered all the additional features we planned for in the second phase of development, post mid-term. Building up on the initial version, this post will run you through the general features and additional improvements covered.

A live demo of this release can be found here: http://andromeda.ayrus.net:8080/

Introducing Acapulco: Building Clustered Parallel Coordinates Graphs from HPFeeds data

…and the summer is over. During the last three months I have tried to make sense of the highly unstructured data set that comes from merging the data streams of several hpfeeds channels. I have had to learn the inner workings of Splunk, their SDKs, the D3.js graphic library and explore different machine learning frameworks and clustering algorithms.

Beta Release of Imalse--Integrated MALware Simulator & Emulator!

As the GSOC approaches the end. I would like to publish a beta version of my project for Network Malware Simulation.

The name for the new open source software is Imalse, which is the acronym of Integrated MALware Simulator & Emulator

The website for the project is http://people.bu.edu/wangjing/open-source/imalse/html/index.html, in which you can get detailed description, instructions for installation and demos.

Capture HPC Client for Linux released!

I'm proud to announce the release of new Capture HPC client module.

The new version - 0.9 beta implements totally new system monitoring method. The old one - strace - was replaced by kernel module that intercepts some system calls to record events for later analysis.

VM image for Network Analyzer and installation howto

There is a vm image, that you can import the appliance and see the application at your own machine. You may download the ova file here: http://www.loopbacking.info/ovizart/

To import the image, you will need VirtulBox installed.

First release from Network Analyzer project

Hi everyone, I am announcing an initial release of the Ovizart,
Network Analyzer Project
. Ovizart (OV - Open VİZual Analsis foR network Traffic ) is a web based application that will let users upload captured traffic in a PCAP format, analyze the traffic, and present the traffic in an intuitive manner. The current development branch is located on Github: https://github.com/oguzy/ovizart.

Want to Use Ghost in Your Own Setup?

This is a short introduction to one of the features that the upcoming Ghost 0.2 will offer. I expect to release the new version in late August or early September.

There is a command-line frontend for Ghost already that controls the honeypot's operation, but its capabilities are limited. In particular, the only way to get feedback from Ghost is to read the command-line output. That's only slightly inconvenient if you run the tool manually, but it's not at all suitable for automation, and it makes integrating Ghost into individual analysis setups unnecessarily complicated.

Syndicate content