Outsmarting the smart meter

02 Aug 2014 Johnny Vestergaard
The Conpot team recently introduced what we call the proxy module. Basically we forward the traffic from one service in Conpot to a service running on a real piece of hardware. This is a very successful technique when figuring out a unknown hardware or protocol. Next step then is to decode the messages logged in the proxy module. Most of this step is done by studying books of specifications, leaked manuals and offensive tools.

New release of HoneyDrive; the honeypot bundle Linux distro

26 Jul 2014 Ioannis Koniaris honeydrive
It is my great pleasure to announce that HoneyDrive 3 is here, codenamed Royal Jelly! For those in need of a more official description or for people that haven’t heard of HoneyDrive before, here is one: HoneyDrive is the premier honeypot Linux distro. It is a virtual appliance (OVA) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot SCADA/ICS honeypot, Thug and PhoneyC honeyclients and more.

Vagrant configuration for Thug honeyclient

26 Jul 2014 Ioannis Koniaris thug thug-vagrant vagrant
Vagrant and Docker and wonderful tools that enable security practitioners to easily dive into the DevOps world and use them for InfoSec projects. Continuing from the previous blog post Thug in 5 minutes, here is a Vagrant configuration to setup Thug honeyclient. It’s essentially a simple shell script to automate the installation of Thug, which is applied to a virtual machine (created with VirtualBox) upon launch. To use it, first install VirtualBox and Vagrant itself for your OS version.

Global Glastopf statistics for April 2014

16 Jul 2014 Mikael Keri glastopf logs report statistics
During the month of April the following information was obtained from Glastopf installations worldwide Number of alert for the period: 1325919 Filenames (RFI) - 10 most common during the period: Specifically newsworthy event: Ping back” pingback.ping, which is a legit WordPress feature is misused to DoS victims using legit WordPress sites. URL describing the issue: http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed- denial-of-service-attack.html Method: pingback.pinghttp://victim.com www.anywordpresssite.com/postchosenparam>' Extent: We started monitoring this event, late into the month. But even so, the top 10 victim sites was hit with a total of 13441 requests.

Global Glastopf statistics for May 2014

16 Jul 2014 Mikael Keri glastopf logs reports statistic
During the month of May the following information was obtained from Glastopf installations worldwide Number of alert for the period: 1859863 Filenames (RFI) - 10 most popular during the period: Ping back pingback.ping, which is a legit WordPress feature misused to DoS victims using legit WordPress sites. URL describing the issue: http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html Method: pingback.pinghttp://victim.comwww.anywordpresssite.com/postchosen' Extent: During may we collected 37705 pingback.ping request targeting various sites. This month it were sites that was facilitating DDoS attacks that was in focus, most likely from competition.

Thug 0.5 and KYT paper

10 Jul 2014 Angelo Dellaera honeyclient kye kyt thug
Thug 0.4.0 was released on June, 8th 2012 and a huge number of really important features were added since then. During the last two years I had a lot of fun thinking and designing the future of the project and I’m really proud of what Thug is now. I have to thank a lot of persons who contributed with their suggestions, ideas, bug reports and sometimes patches. You know who you are.

Released peepdf v0.3

18 Jun 2014 Jose Esparza analysis exploit pdf shellcode tool vulnerabilities
After some time without releasing any new version here is peepdf v0.3. It is not that I was not working in the project, but since the option to update the tool from the command line was released creating new versions became a secondary task. Besides this, since January 2014 Google removed the option to upload new downloads to the Google Code projects, so I had to figure out how to do it.

Thug in 5 minutes

17 Jun 2014 Ali Ikinci docker thug
Ever wanted to run up a quick instance of Thug on a couple of malicious web sites or try it out but lacked the sys op knowledge or time to install it? Here is the opportunity. Thanks to Docker you can run Thug up in a matter of minutes. Jose Nazario and me have created two docker images which are in the Docker Hub ready to run. So this is how to do it:

EXTRA workshop news !

09 May 2014 Leon van der Eijk workshop
Well folks, just a few days and the workshops will kick off ! Registrants, please remember to bring your printed tickets ! The on-line registration was closed on May 8th and tickets are almost sold out. Just a few tickets are left for on-site registration. No promises, but if you are in the area. Check it out !