Honeypots Mode:
(Page 4 of 109)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Honeyd Scripts IP Information Script 2009-02-14
Joshua Gimer (jgimer gmail com)
I forgot to include the IP Information script that is linked to in the
database search output page.

Here it is, just make sure to read the README and place the contents
of the tarball in the same directory as the other scripts.

--
Thx
Joshua Gimer
BZh91AY&SYwf? ?ÿ?Ü° @|ÿÿÿ÷ÿÿÿÿÿû?` o¼;5Æod5ì

[ more ]  [ reply ]
Graphic visualization of honeyd logs 2009-02-11
Joshua Gimer (jgimer gmail com)
Here are the scripts that I promised. They come without any warranty.

There are plenty of ways to make them better (understatement), I have
only worked on them in my free time outside of work.

Maybe someone who as a little more web experience can doctor them up
to be more visually appealing and se

[ more ]  [ reply ]
Honeypot+tarpit 2009-02-09
Ali Zand (ali zand gmail com)
Hi,
I am searching for a good honeypot which has tarpit.
It would be great if the tarpit listens for closed ports on used IP's,
and responds on them (by Syn+Ack). This way the attacker will not be
able to know list of open ports on that system.

Thanks in advance
--
Ali Zand

[ more ]  [ reply ]
3rd CfP DIMVA09 Extended Deadline Feb 13 2009-02-05
Sebastian Schmerl (sbs informatik tu-cottbus de)
(We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------

EXTENDED DEADLINE FOR PAPER SUBMISSION
February 13, 2009

---------------------------------------------------------------

[ more ]  [ reply ]
RAID 2009 CFP 2009-02-05
Corrado Leita (corrado_leita symantec com)
Apologies if you receive multiple copies of this message.

================================================================

CALL FOR PAPERS
RAID 2009

12th International Symposium on
Recent Advances in Intrusion Detecti

[ more ]  [ reply ]
Graphic visualization of honeyd logs 2009-02-03
Leonardo Andrade (landrade pop-es rnp br) (3 replies)
I tried search a tool for graphical visualization for honeyd 1.5c
logs, but i only found honeyview (it seems outdated). Do you have any
suggestion for graphical visualization of honeyd logs?

Thanks in advance,

Leonardo Andrade.

[ more ]  [ reply ]
Re: Graphic visualization of honeyd logs 2009-02-08
Joshua Gimer (jgimer gmail com) (1 replies)
Re: Graphic visualization of honeyd logs 2009-02-09
Leonardo Andrade (landrade pop-es rnp br)
Re: Graphic visualization of honeyd logs 2009-02-06
Joshua Gimer (jgimer gmail com)
Re: Graphic visualization of honeyd logs 2009-02-06
Gergely Révay (gergely revay gmail com)
Second Call for Paper - DIMVA 2009 2009-01-28
Sebastian Schmerl (sbs informatik tu-cottbus de)
(We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------

SECOND
CALL FOR PAPERS

DIMVA 2009

Sixth International Co

[ more ]  [ reply ]
Picviz 0.5 released 2009-01-25
Sebastien Tricaud (stricaud inl fr)
Picviz 'No blackcomb in March' 0.5 is out.

* What is Picviz? *

When considering log files for security, usual applications available today
either look for patterns using signature databases or use a behavioral
approach. In both cases, information can be missed. The problem becomes
bigger with syst

[ more ]  [ reply ]
CfP DIMVA 2009 2009-01-21
Sebastian Schmerl (sbs informatik tu-cottbus de)
(We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------

FIRST
CALL FOR PAPERS

DIMVA 2009

Sixth International Co

[ more ]  [ reply ]
Videos from HITBSecConf2008 - Malaysia released! 2009-01-20
Praburaajan (prabu hackinthebox org)
The videos from HITBSecConf2008 - Malaysia are now available for download!

Day 1
=====

http://thepiratebay.org/torrent/4654588/HITBSecConf2008_-_Malaysia_Video
s___Day_1

Keynote Address 1: The Art of Click-Jacking - Jeremiah Grossman
Keynote Address 2: Cyberwar is Bullshit - Marcus Ranum

Present

[ more ]  [ reply ]
Honeypot logs help 2009-01-19
ny101880 (ny101880 yahoo com)

Good day,

Hi all, i have some question about honeypot packages. There are small
available documentation regarding those packages so I think posting the logs
whill help me understand the logs

I have 4 logs generated and Im not sure If its really a real attack.
All I need is a simple but clear expl

[ more ]  [ reply ]
CfP DIMVA 2009 2009-01-13
Sebastian Schmerl (sbs informatik tu-cottbus de)
(We apologize if you receive multiple copies of this message.)
----------------------------------------------------------------------

PRELIMINARY
CALL FOR PAPERS

DIMVA 2009

Sixth International

[ more ]  [ reply ]
CFP - ASIA '09 - 4th Annual Symposium on Information Assurance 2009-01-05
Damira (damira gmail com)
-- On Behalf of ASIA '09 Chair Sanjay Goel <goel (at) albany (dot) edu [email concealed]>

CALL FOR PAPERS
4th Annual Symposium on Information Assurance (ASIA '09)
12th Annual New York State Cyber Security Conference
June 3-4, 2009, Empire State Plaza (Albany, NY)

Website: http://www.albany.edu/iasymposium

IMPORTANT DATES
Pap

[ more ]  [ reply ]
RE: regarding setup of a honeypot in restricted environment 2008-11-25
Bhatnagar, Mayank (mbhatnagar ipolicynetworks com)


Hi all,

Thanks for the many responses I received on this thread.
Thanks Antonio, Jesper, Noah, Dharm for some valuable suggestions including

1. redirection of some common TCP/UDP ports
2. MAC spoofing
3. client honeypot setup

Well I plan to begin with initial client honeypot set up and observe

[ more ]  [ reply ]
CanSecWest 2009 CFP (March 18-20 2009, Deadline December 8 2008) 2008-11-25
Dragos Ruiu (dr kyx net)
Call For Papers

The CanSecWest 2009 CFP is now open.

Deadline is December 8th, 2008.

CanSecWest CALL FOR PAPERS

VANCOUVER, Canada -- The tenth annual CanSecWest applied
technical security conference - where the eminent figures
in the international security industry will get t

[ more ]  [ reply ]
Fwd: regarding setup of a honeypot in restricted environment 2008-11-25
dharm (dharm910 gmail com)
---------- Forwarded message ----------
From: dharm <dharm910 (at) gmail (dot) com [email concealed]>
Date: Tue, Nov 25, 2008 at 10:36 AM
Subject: Re: regarding setup of a honeypot in restricted environment
To: Jesper Jurcenoks <jesper.jurcenoks (at) netvigilance (dot) com [email concealed]>
Cc: "Bhatnagar, Mayank" <mbhatnagar (at) ipolicynetworks (dot) com [email concealed]>,
"honeyp

[ more ]  [ reply ]
Date/Time issue on Honeywall 2008-11-18
secpuffy (secpuffy gmail com) (1 replies)
Hi,

How can I fix the timestamps that appear in walleye? and honeywall?
I am in America/Los_Angeles PDT timezone.

thx.

[ more ]  [ reply ]
regarding setup of a honeypot in restricted environment 2008-11-24
Bhatnagar, Mayank (mbhatnagar ipolicynetworks com) (2 replies)
Re: regarding setup of a honeypot in restricted environment 2008-11-25
Noah Meyerhans (noahm csail mit edu) (1 replies)
RE: regarding setup of a honeypot in restricted environment 2008-11-24
Jesper Jurcenoks (jesper jurcenoks netvigilance com)
Re: botnet logs 2008-11-17
Valdis Kletnieks vt edu
On Mon, 17 Nov 2008 10:15:06 EST, dxp said:

> Many trojans these days can easily bypass defautl firewall protection in
> XP Sp2. If any of those include self replication with exploit against
> some vulnerability (ms08-067) then history will be repeated, to a
> certain extent.

Read carefully what

[ more ]  [ reply ]
botnet logs 2008-11-15
Nathan (nathan trav gmail com) (2 replies)
Hi,

I have to make a brief presentation about honeypots and botnets
relation. I chose honeyd as an example honeypot, i am already running
it, but due to limited ip resources and short time, I wasn't able to
gather any valueable information.
I would be pleased, if anyone could send me a honeyd log o

[ more ]  [ reply ]
Re: botnet logs 2008-11-17
Gabriele Zanoni (gabrieleml securenetwork it)
Re: botnet logs 2008-11-17
Valdis Kletnieks vt edu (1 replies)
Re: botnet logs 2008-11-17
Nathan (nathan trav gmail com)
(Page 4 of 109)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus