To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.

Blogs

In-depth interview: Angelo Dell'Aera

Angelo Dell'Aera (@angelodellaera) is currently Chief Executive Officer of the Honeynet Project. His interests are botnet tracking, honeyclient technologies and malware analysis. His previous research on TCP congestion control algorithms led to the design of the TCP Westwood+ algorithm and the implementation in the official Linux kernel. He’s the lead developer of the low-interaction honeyclient Thug.

Workshop news ! Mittegating botnets allmost soldout !

The workshop held by Tillman Werner is almost sold out folks ! Register while you can at http://warsaw2014.honeynet.org/
Tillman will be talking about understanding and mitigating botnets ! Checkout http://warsaw2014.honeynet.org/trainings.html#training1

New platinum sponsor for our anual workshop !

The honeynet project is excited and proud to have Deutsche Telekom aboard as a platinum sponsor for our annual workshop in Warshaw 2014 ! DT is a 143 million mobile customer telecom operator. More information on this telecom giant can be found at www.telekom.com/company/at-a-glance/92662

In-depth Interview: Lukas Rist

Lukas Rist (@glaslos) is a software engineer with Blue Coat Norway where he develops behavioral malware analysis systems. In his spare time, he creates web application and ICS/SCADA honeypots and botnet monitoring tools under the umbrella of the Honeynet Project. He recently developed an interest in industrial security and automated SQL statement classification. He will be giving a live demo on Conpot at the upcoming The Honeynet Project workshop in Warsaw, on May 13. Here are his answers to our questions: keep reading to get to know a bit more about him.

In-depth Interview: Maximilian Hils

Maximilian Hils (@maximilianhils) is a student of Information Systems at WWU Münster, Germany. He is one of the two core developers of mitmproxy, on which he started to work on during his Honeynet Google Summer of Code project in 2012. In his spare time, he develops web applications and slays SSL dragons whereever he finds them. Recently, he developed an interest in Cloud Storage Security and Security Usability. He will be giving a live demo about "slaying SSL dragons with mitmproxy" at the upcoming annual The Honeynet Project workshop in Warsaw on May 13. Here you have a nice way to discover something more about him and his work.

In-depth Interview: Sebastian Pöplau

Sebastian Pöplau (@poeplau) is the lead developer of the Ghost USB Honeypot, a detection system for USB malware. He is an IT security enthusiast and a full member of the Honeynet Project. He has studied in Bonn, Germany, and Santa Barbara, CA, and works with Lastline. He will be giving a live demo about code-loading techniques on Android during the annual The Honeynet Project Workshop in Warsaw on May 12. Here you have a good chance to get to know him a bit more.

World-wide security training you cannot afford to miss!

The Honeynet Project will offer 4 world-class training courses for the 2014 workshop. The topics are as follows:

1. Understanding and Mitigating Botnets by Tillmann Werner: Tillmann is a specialist in botnet takeover. His talk will take the form of a comprehensive class beginning with botnet architecture introduction, ranging from old-school centralized IRC botnets to advanced P2P botnets. Learn, using hands-on exercises, the techniques used in modern botnets to improve resilience and discussed strategies to take them down.

WORKSHOP NEWS - May 12-14 in Warsaw, Poland

Mon 5 May 2014 : :
We are very proud to announce that ticket sales are beyond our expectations ! So hurry up if you are planning to attend and http://warsaw2014.honeynet.org/register.html for registration !

Wed 9 April 2014 : : FIRST.org joins the 2014 workshop Sponsorship team
The honeynet project is proud to announce that the annual workshop in Warsaw will be sponsored by FIRST.org! The Forum of Incident Response and Security Teams (FIRST www.first.org ) is the premier organization and recognized global leader in incident response. Membership in FIRST enables incident response teams to more effectively respond to security incidents reactive as well as proactive. FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.

GSoC 2014 Mentoring Organization Applications

Over the past five years, The Honeynet Project has been had the pleasure of mentoring over 70 lucky bachelors, masters and PhD students from all over the world through Google Summer of Code (GSoC), Google's ongoing programme of support for international students working on free open source software (FOSS). Together we have worked on a large number of information security tools, including some that have gone on to be the leading examples of tools in their chosen field.

Malware-serving theaters for your android phones - Part 2

In this post I will analyze the Android APK files that my friend Pietro Delsante from the Honeynet Project Sysenter Chapter talks about in his previous post (thank you Pietro). The files are all named "video.apk" and these are the MD5 and SHA256 hashes:

Syndicate content