- About us
- Code of Conduct
- Google SoC
- Recent posts
- Security Workshops
Much to the excitement of students all around the world, tonight Google officially announced which mentor organisations have been accepted for Google Summer of Code (GSoC) 2010, and the Honeynet Project are delighted to have been selected as one of 151 such mentoring organisations! You can view the full list here:
Well, Google Summer of Code 2010 is now officially up and running, with the deadline for organisation applications closing 45 minutes ago. Happily the Honeynet Project's application for GSoC 2010 was submitted on time, so all we can do now is sit back and wait until March 18th to find out if we are one of the lucky organisations selected this year. Read more »
Folks, its a frosty Tuesday morning in Seattle and the deadline for submissions to the forensic challenge 2010/2 "browsers under attack" has passed. We received a total of 34 for submissions from folks all over the world. Nicolas from the Singapore chapter will be judging the submissions in the next few days. We will announce the top three winners on Monday, 22nd of March 2010. Alongside, we will post their submissions as well as our sample solution. Since we were using a web form for this challenge, we will not acknowledge receipt of each submission. If you are unsure whether submission was successful, please email [email protected] and we can check the submission database.) Also, if you have any suggestions on how to improve the forensic challenge, please let us know.
Chief Communications Officer
The Honeynet Project
PS: Forensic Challenge 2010/3 is currently being prepared. In this challenge, a memory dump needs to be analyzed...so a bit different from our past couple of challenges that focus on network traces....I hope to see many submissions on it. We expect to post it Tuesday, 23rd of March 2010...
We have decided to extend the submission deadline for our second forensic challenge - "browsers under attack" to Monday, 8th of March 2010. This gives you another week to participate in our latest challenge. Subsequently, the announcement of the results will also move another week to Monday, 22nd of March 2010.
I have contacted all the folks that have already submitted their solution to us about this change. They, of course, have the opportunity to resubmit their solution, if they so wish, until the new submission deadline on the 8th. (If you have submitted and did not receive an email from me, please contact us at [email protected])
Challenge 2 focuses on browser attacks and can be accessed at Forensic Challenge 2010/2. The top 3 submissions will be awarded prizes.
Last year the Honeynet Project entered Google Summer of Code (http://socghop.appspot.com/gsoc/program/home/google/gsoc2009) for the first time. We received 9 Google funded student places and also funded 3 more places of our own, all of whom successfully completed their projects in a wide range of areas of open source security R&D. You can find out more in our Google SoC 2009 section of our website (https://www.honeynet.org/gsoc). Read more »
our first Scan of the Month Challenge in 2010 is over! We received 91 submissions in total, and some parts of the solutions are so interesting that I would like to publicly highlight them in this post. Now that the winners are announced (Congratulations Ivan, Franck, and Tareq!), I think I also owe you an explanation why we asked the specific questions and what we expected as answers. I am sure you will be surprised how many pieces of information you can dig up in a plain pcap - I was indeed when I had a look at the solutions we received. Enjoy! Read more »
Challenge 2 of the Honeynet Project Forensic Challenge has just been posted. The challenge has been provided by Nicolas Collery from the Singapore Chapter and Guillaume Arcas from the French Chapter and is titled browsers under attack.
Submission deadline is March 1st and results will be released on Monday, March 15th 2010. Small prizes will be awarded to the top three submissions.
I am very pleased to announce the winners to the 1st Honeynet Project Forensic Challenge 2010 - pcap attack trace. We had a total of 91 submissions and the top three submissions are true rock star submissions. The winners are:
Congratulations to the winners!!! Each winner will receive a signed book from one of our Honeynet Project authors.
A sample solution (created by Tillmann, Markus, Hugo and Cameron) is available on the forensic challenge web site at FC 2010 - Challenge 1 - Pcap attack trace. On that page you will also find the submissions of the three winners. Tillmann, who single handedly judged all submissions, will be summarizing highlights from various submissions in a blog post shortly.
All folks that have submitted a solution should have received an email with information about their individual score as well as placement.
Nicolas Collery from the Singapore Honeynet Chapter and Guillaume Arcas are finalizing the second forensic challenge.The challenge will be 'browsers under attack' and I personally am very excited about this challenge. I hope we will receive many submissions from all who participated in challenge 1 (and hopefully more.) I will post to our web site honeynet.org in the next few days.
Thanks again - looking forward to the next challenge!
Christian Read more »
Monday, February 1st, the submission deadline for challenge 1 of the Forensic Challenge 2010 has passed. We have received 88 submissions and Tillmann who has been judging them mentioned there were some excellent submissions in the mix. Tillmann will be highlighting some answers when we announce the results on the 15th of February.
I have acknowledged receipt of each submission received via email. If you have not received a confirmation mail from me, please contact me at [email protected] and I will check whether we have received it.
On January the 22nd I met Sven. Sven is a bachelor student at the Bern university of applied sciences and will write his thesis about Glastopf. During his work he will rewrite the current Glastopf unstable version, but when he will be finished the new version will have at least the same features like the previous version. The goals are: A much better modular structure, this means there is one core which directs every request to the modules. They store the data, emulating the vulnerability and compose the response which the core gives back to the attacker. There will be a much better classification of incoming attacks and the rules used for this will be totally detached from the source code to distribute them easily between different sensors. I will post some details as soon as we started the work. This also means that we will freeze the current unstable version to put all effort into the new version. Read more »