- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
February 11, 2017
Published by Maximilian Hils at February 11, 2017
Categories
After successfully participating in GSoC between 2009 and 2016, and having created or extended many honeynet technologies that have since gone on to become industry standard […]
December 28, 2016
Published by Roberto Tanara at December 28, 2016
Categories
Uncategorized
Back in November, the Honeynet Project announced the appointment of a new Chief Research Officer: Lukas Rist took the role after a long and successful tenure […]
November 24, 2016
Published by Rogier Spoor at November 24, 2016
Categories
Uncategorized
SIDN Fund offers financial support for DDOS alerting service Within our HoneyNED chapter two people are working on DDOS detection techniques by using honeypot technology. […]
November 2, 2016
Published by Fedele Mantuano at November 2, 2016
Categories
SpamScope (https://github.com/SpamScope/spamscope) is a fast and advanced tool for email analysis developed by Fedele Mantuano (@fedelemantuano). The analysis engine it’s based on Apache Storm and Streamparse. […]
September 9, 2016
Published by Johnny Vestergaard at September 9, 2016
Categories
Introduction This blog post is a follow up to an earlier article, where I set out to conceive a system that could deliver the data needs […]
September 5, 2016
Published by Roberto Tanara at September 5, 2016
Categories
Thug is a client honeypot that emulates a real web browser, fetches and executes any internal or external JavaScript, follows all redirects, downloadable files just like […]
August 26, 2016
Published by Roberto Tanara at August 26, 2016
Categories
CuckooML is a GSOC 2016 project by Kacper Sokol that aims to deliver the possibility to find similarities between malware samples based on static and dynamic […]
July 27, 2016
Published by Roberto Tanara at July 27, 2016
Categories
Uncategorized
DigitalOcean, a leading cloud computing platform, announced its support of The Honeynet Project with donation of Web infrastructure and support services. The partnership will allow The Honeynet Project […]
- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
February 11, 2017
Published by Maximilian Hils at February 11, 2017
Categories
After successfully participating in GSoC between 2009 and 2016, and having created or extended many honeynet technologies that have since gone on to become industry standard […]
December 28, 2016
Published by Roberto Tanara at December 28, 2016
Categories
Uncategorized
Back in November, the Honeynet Project announced the appointment of a new Chief Research Officer: Lukas Rist took the role after a long and successful tenure […]
November 24, 2016
Published by Rogier Spoor at November 24, 2016
Categories
Uncategorized
SIDN Fund offers financial support for DDOS alerting service Within our HoneyNED chapter two people are working on DDOS detection techniques by using honeypot technology. […]
November 2, 2016
Published by Fedele Mantuano at November 2, 2016
Categories
SpamScope (https://github.com/SpamScope/spamscope) is a fast and advanced tool for email analysis developed by Fedele Mantuano (@fedelemantuano). The analysis engine it’s based on Apache Storm and Streamparse. […]
September 9, 2016
Published by Johnny Vestergaard at September 9, 2016
Categories
Introduction This blog post is a follow up to an earlier article, where I set out to conceive a system that could deliver the data needs […]
September 5, 2016
Published by Roberto Tanara at September 5, 2016
Categories
Thug is a client honeypot that emulates a real web browser, fetches and executes any internal or external JavaScript, follows all redirects, downloadable files just like […]
August 26, 2016
Published by Roberto Tanara at August 26, 2016
Categories
CuckooML is a GSOC 2016 project by Kacper Sokol that aims to deliver the possibility to find similarities between malware samples based on static and dynamic […]
July 27, 2016
Published by Roberto Tanara at July 27, 2016
Categories
Uncategorized
DigitalOcean, a leading cloud computing platform, announced its support of The Honeynet Project with donation of Web infrastructure and support services. The partnership will allow The Honeynet Project […]
- Filter by
- Categories
- Tags
- Authors
- All
- Analysis
- Android
- Chapters
- Data-Mining
- Encryption
- Forensic Challenges
- Google Summer of Code
- Honeypot
- Know Your Enemy
- News
- Uncategorized
- Workshop
- All
- 2010
- 2018
- 6guard
- active defense
- Active Response Continuum
- activities
- afterglow
- afterglow cloud
- aggressive network defense
- ajgamma.liveblog.com
- Analysis
- android
- annual
- annual status report
- anti-debugging
- APIMonitor
- APK
- APKinspector android malware static analysis
- ARE
- arp spoof
- Art
- ASLR
- assembly
- attack
- Attack Graph
- Attribution
- axis
- beginner
- Beta
- Bifrozt
- blogging
- botnet
- botnet monitoring
- botnet protocols
- Botnets
- browsers under attack
- c++
- canberra
- capture-hpc
- capture-hpc honeyclient honeyspider
- carberp
- CEO
- CFG
- challenge
- challenge 2
- chapter
- Citadel
- civil process
- client
- clustering
- code of conduct
- Computer Fraud and Abuse Act
- conference
- conficker
- conpot
- control flow
- counter-attack
- criminal process
- cro
- Crowdstrike
- cuckoo
- cuckoo sandbox androguard gsoc
- cuckoo sandbox malware analysis
- d3.v2
- Dalvik
- Damballa
- data
- data link layer attacks
- data mining
- Data model Honeyweb tutorial
- data visualization
- dbscan
- DDoS
- DDOS Honeypot
- debian
- decompilation
- demo
- DEP
- dependencies
- detect
- detection
- dhcp starvation
- dionaea
- Django
- Docker
- Dorothy
- downadup
- dpkt
- droidbot
- droidbox
- dubai
- dubai2013
- Dynamic
- dynamic analysis
- dynamic malware analysis virtuaization cuckoo gsoc
- EAT filtering
- emet
- Emulation
- encrypted traffic
- encryption
- ethics
- exploit
- exploit replay
- explot
- FC10
- feature
- Feature 1
- flash
- flow
- focus
- Forensic Challenge
- Forensic Challenge 2010
- forensic challenges
- forensics
- format
- framework
- framework honeypot
- frontend
- ftp
- Fuzzy hashing
- GeoDjango
- georg
- Ghost
- glaspot
- glastopf
- GlastopNG
- globalpot
- google summer of code
- Graphviz
- gsoc
- gsoc 2012
- GSoC 2013
- gsoc glutton
- gsoc google
- gsoc gsoc2010
- gsoc gsoc2011
- gsoc snare tanner
- GSoC11
- GSOC2011
- gsoc2011 gsoc
- gsoc2012
- gsoc2013
- gsoc2014
- gsoc2015
- gsoc2016
- gsoc2017
- gsoc2018
- gsoc2020
- GUI
- hack back
- Hackback
- Hacking Back
- Heralding
- HeX
- high interaction honeypot
- hnw2015
- HNW2016
- honeybrid gsoc introduction
- honeybrid gsoc parser
- honeybrid gsoc redirection
- honeybrid gsoc testing
- honeyclient
- honeydrive
- honeymap
- honeyned
- honeynet
- Honeynet Blogs
- honeypot
- honeypots
- honeysink
- honeywall
- honeyweb
- Hong Kong
- Hook
- hpfeeds
- HPSoC
- hpw2012 workshop norman
- HPW2015
- http https proxy gsoc honeyproxy forensics
- hugo gonzalez
- humanitarian law
- ICS
- images
- Imalse
- improper ruse
- infection monkey
- integrity
- intelowl
- interesting
- ipv6
- IRB
- Iteolih
- Iteolih Samba DCERPC Python
- Iteolih Samba DCERPC Python libemu
- Kelihos
- Kelihos.B/Hlux.B
- kippo
- kippo SSH honeypot
- kmeans
- KYE
- KYT
- Law
- law of war
- Layer 2
- layout
- legal
- lessons learned
- libemu
- link-local
- linux
- log record
- logging
- logs
- low-interaction
- Lukas Rist
- MAC flood
- machine learning
- mahmud
- Main blog
- Malaysian Honeynet chapter
- malicious
- malware
- Malware
- malware sandbox cuckoo
- Mariposa
- Meet our new CEO Andre
- Mexican Chapter Annual Report
- Microsoft
- mitmproxy
- Mobile
- mobile HosTage
- mohpt
- Monday
- monthly
- murofet
- nebula
- network
- network traffic
- New Honeynet Project Challenge (#7): Forensic Analysis of a Compromised Server
- new version
- news
- Norway
- oxff
- paper
- parallel coordinates
- parser
- peepdf
- phoneyc
- phoneyc paper leet09 honeyclient
- picviz
- project
- project news
- protocol
- protocols
- publication
- python
- qebek
- qebek sebek qemu windows
- qebek windows
- qebek windows socket network
- qemu
- qemu hook
- qemu qebek
- question
- re-google
- readables
- reading
- release
- replay
- replica bags
- report
- reports
- research
- reverse engineering
- reversing
- ROP
- rumal
- Sambacry
- San Antonio
- sandbox
- sandbox evasion
- SCADA
- scan
- scanner
- sebek
- sebek visualization
- security
- shellcode
- shockpot
- signature
- Simpilified Chinese
- Simplified Chinese
- Simulation
- sink
- sinkhole
- smartphone
- snare
- snort
- social honeypots
- social networks
- spam
- spamscope
- spanish chapter
- speak
- spidermonkey
- splunk
- statistic
- statistics
- status
- Stavanger
- stix
- Storm Worm
- Stormfucker
- STP manipulation
- student
- Symantec
- taiwan
- takedown
- talk
- Tallinn Manual
- tanner
- taxii
- The Italian Honeynet Chapter
- the Menlo Report
- threatintel
- thug
- thug-vagrant
- tool
- traceexploit
- Traditional Chinese
- traffic analyze
- translation
- trojan
- twman
- UI framework
- UK Chapter
- update
- vagrant
- Video
- visualization
- vlan hopping
- vulnerabilities
- Waledac
- Wannacry
- web honeypot
- web server botnet
- webhoneypot
- webservice
- White Paper
- windows
- wireshark
- wireshnork
- wordpot
- workshop
- workshop 2012 facebook
- workshop facebook
- worldmap
- zeus
- zoom
- 繁體中文
- 鑑識分析挑戰
- 香港
February 11, 2017
Published by Maximilian Hils at February 11, 2017
Categories
After successfully participating in GSoC between 2009 and 2016, and having created or extended many honeynet technologies that have since gone on to become industry standard […]
December 28, 2016
Published by Roberto Tanara at December 28, 2016
Categories
Uncategorized
Back in November, the Honeynet Project announced the appointment of a new Chief Research Officer: Lukas Rist took the role after a long and successful tenure […]
November 24, 2016
Published by Rogier Spoor at November 24, 2016
Categories
Uncategorized
SIDN Fund offers financial support for DDOS alerting service Within our HoneyNED chapter two people are working on DDOS detection techniques by using honeypot technology. […]
November 2, 2016
Published by Fedele Mantuano at November 2, 2016
Categories
SpamScope (https://github.com/SpamScope/spamscope) is a fast and advanced tool for email analysis developed by Fedele Mantuano (@fedelemantuano). The analysis engine it’s based on Apache Storm and Streamparse. […]
September 9, 2016
Published by Johnny Vestergaard at September 9, 2016
Categories
Introduction This blog post is a follow up to an earlier article, where I set out to conceive a system that could deliver the data needs […]
September 5, 2016
Published by Roberto Tanara at September 5, 2016
Categories
Thug is a client honeypot that emulates a real web browser, fetches and executes any internal or external JavaScript, follows all redirects, downloadable files just like […]
August 26, 2016
Published by Roberto Tanara at August 26, 2016
Categories
CuckooML is a GSOC 2016 project by Kacper Sokol that aims to deliver the possibility to find similarities between malware samples based on static and dynamic […]
July 27, 2016
Published by Roberto Tanara at July 27, 2016
Categories
Uncategorized
DigitalOcean, a leading cloud computing platform, announced its support of The Honeynet Project with donation of Web infrastructure and support services. The partnership will allow The Honeynet Project […]