- About us
- Code of Conduct
- Google SoC
- Recent posts
- Security Workshops
Thug 0.4.0 was released on June, 8th 2012 and a huge number of really important features were added since then. During the last two years I had a lot of fun thinking and designing the future of the project and I'm really proud of what Thug is now. I have to thank a lot of persons who contributed with their suggestions, ideas, bug reports and sometimes patches. You know who you are. Really thanks!
After some time without releasing any new version here is peepdf v0.3. It is not that I was not working in the project, but since the option to update the tool from the command line was released creating new versions became a secondary task.
Ever wanted to run up a quick instance of Thug on a couple of malicious web sites or try it out but lacked the sys op knowledge or time to install it? Here is the opportunity. Thanks to Docker you can run Thug up in a matter of minutes. Jose Nazario and me have created two docker images which are in the Docker Hub ready to run.
So this is how to do it:
Well folks, just a few days and the workshops will kick off ! Registrants, please remember to bring your printed tickets !
The on-line registration was closed on May 8th and tickets are almost sold out. Just a few tickets are left for on-site registration. No promises, but if you are in the area. Check it out !
With the release of version 0.4.37 the honeyclient thug also supports APK analysis. This feature is made possible through Androguard (https://code.google.com/p/androguard/) ! Grab your copy at https://github.com/buffer/thug or update your code with git pull !
So if you want to attend you better act fast. For more information and registration visit http://warsaw2014.honeynet.org/trainings.html#training1
Felix Leder is the director for malware research at Blue Coat. Several malware analysis solutions, like Cuckoo box and Norman's Malware Analyzer G2, have been initiated by and grown around him. After starting in the mobile space with companies like Nokia, he turned to his favourite field of research IT-Security. During the time he worked for Fraunhofer and the University of Bonn, he joined into researching botnet mitigation tactics and new methodologies for executable and malware analysis. The results were successful takedowns and a PhD. Felix Leder is a reverse engineer and tool developer by heart. He has given world-wide classes on malware analysis, reverse engineering, and anti-botnet approaches. Participants range from governmental institutions, financial & security industries, to military bodies. Read along to know more about him!
Angelo Dell'Aera (@angelodellaera) is currently Chief Executive Officer of the Honeynet Project. His interests are botnet tracking, honeyclient technologies and malware analysis. His previous research on TCP congestion control algorithms led to the design of the TCP Westwood+ algorithm and the implementation in the official Linux kernel. He’s the lead developer of the low-interaction honeyclient Thug.
The workshop held by Tillman Werner is almost sold out folks ! Register while you can at http://warsaw2014.honeynet.org/
Tillman will be talking about understanding and mitigating botnets ! Checkout http://warsaw2014.honeynet.org/trainings.html#training1