To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.

Blogs

Deutsche Telekom Give Their Views on the Hottest Topics at Honeynet Project Workshop 2015

 
This year, the annual Honeynet Project Workshop 2015 event will be sponsored by Deutsche Telekom. In anticipation of the event, we did an exclusive interview with André Vorbach (IT-Security Expert) and Markus Schmall (Vice President IT Security) to find out how Deutsche Telekom is getting involved and what they see as the hot topics at this year’s workshop.
 

Response to "How Microsoft Appointed Itself Sheriff of the Internet" (Part 2)

In the first part of this two part blog post, the issue of anticipating retaliation during an aggressive battle to wrest control of a DDoS botnet was examined. In this part, the issues of dual standards, taking responsibility, and learning lessons to make positive change over time are examined.
 
Read full post here...

Google Summer of Code 2015

With winter in the northern hemisphere beginning to turn into spring, it is once again time to think about summer. And of course, for many open source organizations, that means Google Summer of Code (GSoC).
 

Response to "How Microsoft Appointed Itself Sheriff of the Internet" (Part 1)

This blog post is the first of a two-part series in response to the Wired article of Oct 14, 2014, "How Microsoft Appointed Itself Sheriff of the Internet." [McM14] I find some problems with this article that raise questions about the depth of research into some elements of the story, and an appearance of bias in how "unintended consequences" are presented.

[McM14] Robert McMillan. How Microsoft Appointed Itself Sheriff of the Internet. http://www.wired.com/2014/10/microsoft-pinkerton/, October 2014.

Read full post here...

Thug and the art of web client tracking inspection

A few months ago I read the paper "Technical analysis of client identification mechanisms" [1]. The paper is really interesting and it is really worth investing your time and reading. Just a brief excerpt from the abstract:

Thug 0.6 released!

Thug 0.6 was released just a few hours ago. The most important change introduced during the 0.5 branch was a complete redesign of the logging infrastructure which is now completely modular. This makes adding (or removing) new logging modules extremely easy.

Meet the CEO

Angelo, you have been HNP CEO for more than over a year now. What were your goals when you started and did you achieve them?

First of all let me confess that it seems really incredible to me that a year has already gone by. I took over the CEO position for the Honeynet Project from Christian Seifert more than a year ago and at times the role appeared quite intimidating to me. Christian and Honeynet Project founder Lance Spitzner did an awesome job of driving the organization

Kippo fork - all in one

Hello,

last week I published kippo fork https://gitlab.labs.nic.cz/honeynet/kippo
which contains commits from https://github.com/micheloosterhof/kippo-mo
(Michel Oosterhof brought awesome SFTP, and exec support)
and original kippo https://github.com/desaster/kippo
(I am very pleased is now on github. was on google code before).

On top of that are my changes:

The new version of dorothy2 is out!

Howdy all,
The Italian Chapter is proud to release the latest version of dorothy2 (our ruby-based malware analysis framework) :).

Syndicate content