Global Glastopf statistics for June 2014

08 Aug 2014 Mikael Keri glastopf logs reports statistics

During the month of June the following information was obtained from Glastopf installations worldwide

Geographical spread

10 most popular injected files during the period

Short introduction to RFI:

“Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file or more serious events such as: Code execution on the web server .. “ source: Wikipedia

Global Glastopf statistics for April 2014

16 Jul 2014 Mikael Keri glastopf logs report statistics

During the month of April the following information was obtained from Glastopf installations worldwide

Number of alert for the period: 1325919

Filenames (RFI) - 10 most common during the period:

Hashes - 10 most common during the period:

Hash Hits
F8a4da2e35b840891335d90cb48a6660 6256
b8cbfe520d4c2d8961de557ae7211cd2 1072
3cc11c8fa7e3e36f0164bdcae9de78ec 998
7de0bcb903eaba7881c6d03a8c7769a8 682
9e866b8855c08a93f23afce1b9a79756 460
67b873f7541b039c049414dfe3fd7993 352
9f67913d2c77545a4187053ad18230e4 187
fbef119cf310d6b0b40af7e486416f82 186
ab4d03072cc0532afc83d13854ed7e4f 173
afdc0866a82a6bb23bc4d4fb329672b6 172

Specifically newsworthy event: Ping back”

pingback.ping, which is a legit WordPress feature is misused to DoS victims using legit WordPress sites.

Global Glastopf statistics for May 2014

16 Jul 2014 Mikael Keri glastopf logs reports statistic

During the month of May the following information was obtained from Glastopf installations worldwide

Number of alert for the period: 1859863

Filenames (RFI) - 10 most popular during the period:

Hashes - 10 most popular during the period:

Hash Hits
48101bbdd897877cc62b8704a293a436 2425
4997ed27142837860014e946eed96124 2050
d070c4cccf556b9da81da1e2de3cba54 644
3cc11c8fa7e3e36f0164bdcae9de78ec 330
ab4d03072cc0532afc83d13854ed7e4f 286
8f8adad762a39ba298b9ee8b7555acf3 261
474c4daeff3d82ae49d7c96acb8c0d84 208
e5f9687d94bf23f395799dec3fcafc3f 199
873f84fe2b641c2934203c7f6621b7fb 167
7de0bcb903eaba7881c6d03a8c7769a8 124

Ping back

pingback.ping, which is a legit WordPress feature misused to DoS victims using legit WordPress sites.

Free Honeynet Log Data for Research

26 Jun 2009 Anton Chuvakin data honeynet honeypot linux logging logs research security

UPDATE: the log data is posted here.  A notification group about new log sharing is here.

This WASL 2009 workshop reminded me that I always used to bitch that some academic researchers use antediluvian data sets for their research (Lincoln labs 1998 set used in 2008 “security research”  makes me want to just curse and kick people in the balls, then laugh, then cry, then cry more…).

However, why are they doing it? Don’t they realize that testing their “innovative intrusion detection” or “neural network-based log analysis” on such prehistoric data will not render it relevant to today’s threats? And will only ensure ensuing hilarity :-)