Join us for the Honeynet Workshop 2024: May 27th–29th, Copenhagen, Denmark

"Secure Exploit Payload Staging…or how we did not kill an 0day at Defcon"

11 Jan 2013 Sjur Usken georg honeynet oxff workshop
We have interviewed Georg Wicherski, who is one of the speakers for the Honeynet Workshop in Dubai 10-12 of February. Georg will give a briefing about “Secure Exploit Payload Staging…or how we did not kill an 0day at Defcon” So Georg, why did you become a security expert? Pathos: Hacking is my second love after my family and working as a security person allows me to live my passion every day.

Visualize your attacks workshop in Dubai 10-12th

09 Jan 2013 Sjur Usken dubai2013 honeynet workshop
We have interviewed Raffy, who is one of the teachers for the Honeynet Workshop in Dubai 10-12 of February. Raffy will give the following talk: How Big Data, Data Mining, and Visualization Enable Security Intelligence and a class on Information Visualization - Bridging the Gap Between Tufte and Firewalls" So Marty, tell us, why did you become a security expert? I studied computer science with an emphasis on cryptography. While I loved the mathematical puzzles that the crypto field offered, I couldn’t imagine doing that for a living.

Interesting Reads: Mon^H^H^HTuesday 24th July

24 Jul 2012 Matt Erasmus honeynet interesting news readables
Good morning folks My apologies for the delay on this one. It appears the the wily coyote has passed on his tricks to my Internet connection and as such I’ve been offline for a fairly large portion of time. No matter….onward to the readables !! Malware An in-depth code analysis of mssecmgr.ocx from the ESET folks is here. The Virus Total crew are bringing some seriously cool features to VT. More here

Free Honeynet Log Data for Research

26 Jun 2009 Anton Chuvakin data honeynet honeypot linux logging logs research security
UPDATE: the log data is posted here. A notification group about new log sharing is here. This WASL 2009 workshop reminded me that I always used to bitch that some academic researchers use antediluvian data sets for their research (Lincoln labs 1998 set used in 2008 “security research” makes me want to just curse and kick people in the balls, then laugh, then cry, then cry more…). However, why are they doing it?