Tag Archives: Honeynet Project

Low-interaction honeyclient Thug released!

I’m glad to announce I publicly released a brand new low-interaction honeyclient I’m working on from a few months now. The project name is Thug and it was publicly presented during the Honeynet Project Security Workshop in Facebook HQ in … Continue reading

Posted in Honeynet Project, Projects, Thug | Tagged , ,

Forensic Challenge 8 – “Malware Reverse Engineering”

I am pleased to announce the next forensic challenge: Forensic Challenge 8 – “Malware Reverse Engineering”. The challenge has been created by Angelo Dell’Aera and Guido Landi from the Sysenter Honeynet Project Chapter. Submission deadline is June 15th and we … Continue reading

Posted in News | Tagged , , ,

Forensic Challenge 2010/6 – Analyzing Malicious Portable Destructive Files is now live

Another challenge is ready to be tackled by forensic analysts, students, hackers and alike. This time, we present you with an attack vector that has become quite successful: malicious PDF files! For challenge 6 of our series (provided by Mahmud Ab … Continue reading

Posted in Honeynet Project, News | Tagged ,

Forensic Challenge 2010/5 – Log Mysteries is now live

Forensic Challenge 5 – Log Mysteries is now live! This challenge takes you into the world of virtual systems and confusing log data. Figure out what happened to a virtual server using all the logs from a possibly compromised server. Challenge … Continue reading

Posted in Honeynet Project, News | Tagged ,

PHoneyC DOM Emulation – Browser Personality

A new improvement in PHoneyC DOM emulation code was committed in SVN r1624. The idea is to better emulate the DOM behaviour depending on the selected browser personality. Let’s take a look at the code starting from the personalities definition … Continue reading

Posted in Honeynet Project, PHoneyC, Projects | Tagged , ,

Another great step forward

“Dionaea is meant to be a Nepenthes successor, embedding Python as scripting language, using libemu to detect shellcodes, supporting IPv6 and TLS” (taken from Dionaea homepage). Besides being the most interesting project for trapping malware exploiting vulnerabilities, Dionaea supports a … Continue reading

Posted in Honeynet Project, Projects, TIP | Tagged , ,

PHoneyC DOM Emulation – Window

A few weeks ago I started reviewing the PHoneyC DOM emulation code and realized it was turning to be hard to maintain and debug due to a huge amount of undocumented (and sometimes awful) hacks. For this reason I decided … Continue reading

Posted in Honeynet Project, PHoneyC, Projects | Tagged , ,