Hello,
due to the length of the whole term Improving the effectiveness of low interaction honeypots, I decided to use Iteolih as uniq abbrevitation. Things are rolling for the project, writing code started, a basic homepage with instructions how to compile/use it was created.
I even had the plan to write about it once or twice, finish something in the code, write about it. When I was done with the code, I got the idea, writing about it was not worth your time.
There are of course more of them, but we only list which will bring
confusion to our code. Note that the current version is based on IE,
not FF, since its more vulnerable.
I don’t know how to write HTML in this blog, so i hope i can make them clear without examples.
1. Both in IE and FF, we can use the ID of a DOM object to call it.
It seems that there was some problems in this blog system, and i was busy with my final exam, so i haven’t written blog a long time since the project starts.
But the work has been going on. I’ve been spent some time studying on the language faculty of javascript, and comparing it with python. Though this two are both scripting language, python is somehow much stronger. We’ll see this from the differences between the setter/getter function and __setattr__/__getattr__ method in python.
Hi folks:
I have done some basic shellcode and heapspray detection codes in the phoneyc’s ‘honeyjs’ javascript engine (based on python-spidermonkey, with extra tracing and auditing works). And also I have made a presentation on the local honeynet chinese chapter last weeked. Details about my current approaches can be found on this slide: http://is.gd/J9QP
Z. Chen (Joyan)
PS: This post is also available on my personal blog: http://joyan.appspot.com/2009/06/1/whats_new_phoneyc_2_shellcode_detection.html
The goal of this post is to introduce myself and my project: my name is Robin Berthier and I just got my PhD from the University of Maryland. I’ll be working this summer on improving Honeybrid, a hybrid honeypot architecture. I’ve been working with honeypot technologies for the past 4 years, and Honeybrid represents a central part of my dissertation. Honeypots are usually divided into two categories according to the level of interaction they provide to attackers.
Hello, this initial blog post is used to introduce me and to provide a brief overview of my GSoC Project.
My name is Lukas Rist (my personal blog) and I am currently studying Math and Physics at the University of Kaiserslauter in Germany. This is my first time in GSoC and I will be working with Thorsten Holz on Glastopf, a Web Application Honeypot.
Glastopf is a minimalistic web server emulator written in Python.
Hi folks !
As the GSoC started, this blog entry will introduce to you, myself and my project.
My name is Thibaut, I am still a student like all GSoC participants I guess and I belong to the ENSI of Bourges (France). I took one year off for doing research at the university of Maryland (USA) in the IT security field, especially in honeypots.
About my GSoC project, here is a short description of it:
1. Overview As I wrote in my project outline (https://www.honeynet.org/gsoc/project1) . I should have done some basic enhancement and experiments on python-spidermonkey for a more fine-granted tracing on spidermonkey. So till now what I have done on it includes: a. Implemented the get_globj method in the Context class, which enables one to ‘pull’ all the properties of the global object inside spidermonkey ( namely the global variables, because all the global variables are properties of the global object ) into python context.
Hello all,
As today is the official start of the Google Summer of Code, an introduction both to the project, and for myself seems to be in order. My name is Kevin Galloway, and I’m currently a graduate student, in Computer Science at the University of Alaska, Fairbanks. Most of my background is more on the security side of things, although, at the start, graphics were one of the main reasons I chose computer science.
As the plan is to embedd python as scripting language into the honeypot, I ran a benchmark on a testsuite. The ’testsuite’ is a c core which accepts connections, and allows python to deal with the input. The protocol used for benchmarking is http, the service serves a non static html page.
I tested
2.6.2_(release26-maint,_Apr_19_2009,_02:15:38) 3.0.1+_(r301:69556,_Apr_15_2009,_17:22:45)_ 3.1a1+_(py3k,_Mar_30_2009,_02:02:26)_ To benchmark, I ran the apache benchmark tool ab
ab -n 100000 -c 15 http://localhost:8080/bar