Join us for the Honeynet Workshop 2024: May 27th–29th, Copenhagen, Denmark

Heralding GSoC17 Report

28 Aug 2017 Roman Samoilenko gsoc heralding
The summer is coming to the end as well as my GSoC17 happy days. So, now it’s time to sum up the results and say goodbye to the GSoC until the next year. My impressions about working on the Heralding project Working on the Heralding project was awesome experience for me. I feel I did something helpful, fun and challenging at the same time. I hadn’t wanted anything else before the summer!

Initial analysis of four million login attempts

09 Sep 2016 Johnny Vestergaard analysis heralding honeypot
Introduction This blog post is a follow up to an earlier article, where I set out to conceive a system that could deliver the data needs to answer 5 specific questions. The setup To provide the data needed for this analysis, my setup consisted of 4 VPS situated respectively at Amazon EC2, Azure, MeeBox and a Danish ISP end-user connection. Even though the same 4 VPS were used throughout the data collection, 6 different IP addresses were used for the honeypots - the reason for this was that one of the honeypots had a dynamically assigned IP address.

Heralding - the credentials catching honeypot

23 Mar 2016 Johnny Vestergaard heralding honeypot
Sometimes (actually, most times) you don’t need advanced deception technology, but rather just a simple tool to answer some simple questions. I was recently in that situation, and needed the answers to the following questions: Which protocols does my adversary try to brute-force? Which username and password did he use? At which speed did he brute-force? From where did he proxy from? What time of day did he brute-force? To answer these questions, I needed a tool that would output something similar to: