Author Archives: Angelo Dell'Aera

Thug and the art of web client tracking inspection

A few months ago I read the paper “Technical analysis of client identification mechanisms” [1]. The paper is really interesting and it is really worth investing your time and reading. Just a brief excerpt from the abstract: “In common use, … Continue reading

Posted in Thug | Tagged

Thug 0.6 released!

Thug 0.6 was released just a few hours ago. The most important change introduced during the 0.5 branch was a complete redesign of the logging infrastructure which is now completely modular. This makes adding (or removing) new logging modules extremely … Continue reading

Posted in Projects, Thug

Thug: 1000 commits, 1000 thanks

Two years are passed from the first commit and taking a look at the number of committed patches I realized that right now the patch number 1000 was committed. Let me say it’s really impressive realizing it. In the last … Continue reading

Posted in News

Thug Plugin Framework

In the last months I spent a lot of efforts in Thug development. During these months a few interesting features and improvements were introduced but right now I want to spend some time for taking a look at the new … Continue reading

Posted in Honeynet Project, Projects, Thug

Low-interaction honeyclient Thug released!

I’m glad to announce I publicly released a brand new low-interaction honeyclient I’m working on from a few months now. The project name is Thug and it was publicly presented during the Honeynet Project Security Workshop in Facebook HQ in … Continue reading

Posted in Honeynet Project, Projects, Thug | Tagged , ,

Forensic Challenge 8 – “Malware Reverse Engineering”

I am pleased to announce the next forensic challenge: Forensic Challenge 8 – “Malware Reverse Engineering”. The challenge has been created by Angelo Dell’Aera and Guido Landi from the Sysenter Honeynet Project Chapter. Submission deadline is June 15th and we … Continue reading

Posted in News | Tagged , , ,

Forensic Challenge 2010/6 – Analyzing Malicious Portable Destructive Files is now live

Another challenge is ready to be tackled by forensic analysts, students, hackers and alike. This time, we present you with an attack vector that has become quite successful: malicious PDF files! For challenge 6 of our series (provided by Mahmud Ab … Continue reading

Posted in Honeynet Project, News | Tagged ,