Category Archives: News

GSoC 2015: Introducing YAPDNS

Disclaimer This post is mainly intended for GSoC 2015 students who might want to consider contributing to a new Honeynet Project tool called YAPDNS (Yet Another Passive DNS). If you are interested in contributing to YAPDNS outside of GSoC, you … Continue reading

Posted in GSoC, Honeynet Project, News | Tagged , ,

GSoC 2015: Introducing Thug’s Rumal

Disclaimer This post is mainly intended for GSoC 2015 students who might want to consider contributing to a pretty new Honeynet Project tool called Rumal. If you are interested in contributing to Rumal outside of GSoC, then you will most … Continue reading

Posted in GSoC, Honeynet Project, News | Tagged , ,

Malware-serving theaters for your android phones – Part 2

In this post I will analyze the Android APK files that my friend Pietro Delsante from the Honeynet Project Sysenter Chapter talks about in his previous post (thank you Pietro). The files are all named “video.apk” and these are the … Continue reading

Posted in News | Tagged ,

Malware-serving theaters for your android phones – Part 1

Some nights ago I was heading to a local theater with some (non-nerd) friends. We did not recall very well the address, so I brought out my phone (LG Nexus 4 with Android 4.4.2 and Google Chrome) and googled for … Continue reading

Posted in Exploits, News, Thug | Tagged , , , ,

Thug: 1000 commits, 1000 thanks

Two years are passed from the first commit and taking a look at the number of committed patches I realized that right now the patch number 1000 was committed. Let me say it’s really impressive realizing it. In the last … Continue reading

Posted in News

Forensic Challenge 8 – “Malware Reverse Engineering”

I am pleased to announce the next forensic challenge: Forensic Challenge 8 – “Malware Reverse Engineering”. The challenge has been created by Angelo Dell’Aera and Guido Landi from the Sysenter Honeynet Project Chapter. Submission deadline is June 15th and we … Continue reading

Posted in News | Tagged , , ,

Forensic Challenge 2010/6 – Analyzing Malicious Portable Destructive Files is now live

Another challenge is ready to be tackled by forensic analysts, students, hackers and alike. This time, we present you with an attack vector that has become quite successful: malicious PDF files! For challenge 6 of our series (provided by Mahmud Ab … Continue reading

Posted in Honeynet Project, News | Tagged ,