To learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.

Blogs

Honeynet Project Security Workshop 2012 - VIDEOs posted

Thu, 04/05/2012 - 23:20 — Anonymous

Folks, we had a great time at the Honeynet Project Security Workshop @ Facebook. We'd like to thank again our execellent hosts Facebook, the attendees, and our many speakers.

If you were not able to attend, you can check out the videos at honeynet.org/SecurityWorkshops/2012_SF_Bay_Area/Mar_19/Workshop_Program_Agenda.

  • HPW2012
  • 's blog
  • Read more

Just a few days left to submit your GSoc application

Tue, 04/03/2012 - 22:19 — Anonymous

Students,

the GSoc 2012 student application deadline is approaching (April 06 at 19:00 UTC) - you have 2 days and 20 hours to submit your application to https://www.google-melange.com/gsoc/org/google/gsoc2012/honeynet.

We have an array of exciting open-source security projects posted on our ideas page, but feel free to submit your own idea as well (best to discuss with potential mentors first though). You can reach mentors on gsoc@public.honeynet.org or on #gsoc2012-honeynet on irc.freenode.net.

Hope to see your application soon (If you are planning on submitting an application, we recommend to submit now and modify until the deadline. You dont want to be shut out merely because of connection issues and such...)

- the HP GSoc admin & mentors

  • gsoc 2012
  • 's blog
  • Read more

FAQ on Kelihos.B/Hlux.B sinkholing

Sun, 04/01/2012 - 23:26 — david.dittrich

On March 31, 2012, the Honeynet Project published a draft Code of Conduct and a statement about Ethics in Computer Security Research: Kelihos.B/Hlux.B botnet takedown.

The initial draft of the Code of Conduct was drawn from concepts described in the The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research that was published in the United States Federal Register on December 28, 2011 for public comment. The Code of Conduct was refined through discussion within the Legal and Ethics Committee and volunteer Honeynet Project members to help make it workable within the structure of the Honeynet Project membership for evaluating the ethics of future research activities.

The following FAQ reflects how the Menlo Report principles and proposed Honeynet Project Code of Conduct can be used to analyze and explain an action like the Kelihos/Hlux sinkholing operation.

  • code of conduct
  • ethics
  • Kelihos
  • Kelihos.B/Hlux.B
  • david.dittrich's blog
  • Read more

Ethics in Computer Security Research: Kelihos.B/Hlux.B botnet takedown

Sat, 03/31/2012 - 21:08 — christian.seifert

Earlier, we posted about our operation on the Kelihos.B/Hlux.B botnet takedown that was conducted with by security experts from Dell SecureWorks, CrowdStrike, Kaspersky, and the Honeynet Project. On initial view, the operation seems very clear cut: the bad guys are running a botnet that is doing havoc on the Internet; on the other side, are the good guys that have found a way to disable the botnet.

The situation is much more nuanced. The Honeynet Project has been conducting security research for over a decade now and since our early days, we made it a priority to balance benefit and risks in our research. You can trace this back to when the Honeynet Project first defined "data control" as one of the requirements for honeynet/honeypot deployments. The purpose of data control was to minimize potential harm to others resulting from honeypots, which by their nature are vulnerable systems we expect to be compromised and used by malicious actors.

We do what we do because people with malicious and criminal intent are compromising and abusing millions of computers around the globe. These people do not act in ways that are moral, ethical, or legal. But in trying to counter them, we cannot allow ourselves to similarly disregard our moral, ethical, or legal obligations. If we do, we become no different than them.

We believe that pushing the boundaries in the computer security field and engaging in cutting edge research brings with it a responsibility to act in an ethical manner. Risks may emerge from botnet takedowns and the Kelihos botnet takedown operation is no different. What are the benefits? What are the risks? How do they balance each other? Do our actions jeopardize legal investigations? These are all questions that need to be considered and the outcome will determine how to proceed. In the situation of the Kelihos botnet, the determination was to proceed with the botnet takedown (see below for a detailed assessment.) In other situations, the determination and plan of action may be different. In the instance of Zeus, for instance, legal action may be necessary.

The Honeynet Project is committed to conducting research in a model, ethical, and legal way. Weighing risk/benefits – an important aspect to conduct research in such a way - is what every researcher implicitly does. However, the risk of not considering all aspects of the research exists. As a result, the Honeynet Project, under the leadership of our Chief Ethics and Legal Officer Dave Dittrich, has developed a code of conduct that guides researchers through the process in a systematic manner.

Today, we are publishing a draft of this code of conduct. We hope you find the code of conduct useful and are looking forward to your thoughts and comments.

  • code of conduct
  • ethics
  • Kelihos
  • Kelihos.B/Hlux.B
  • christian.seifert's blog

Kelihos.B/Hlux.B botnet takedown

Sat, 03/31/2012 - 21:03 — christian.seifert

On Wednesday, March 21, 2012, an operation by security experts from Dell SecureWorks, CrowdStrike, Kaspersky, and the Honeynet Project was initiated to sinkhole infected computers in the Kelihos.B/Hlux.B botnet. The objective of this action was to remove from the attacker's control all computers currently infected with the Kelihos.B/Hlux.B malware by poisoning the peer lists and routing tables in the lower layers of command and control. This will prevent the botnet operator from doing any more harm with this set of infected computers.

Control of the botnet with over 129,000 infected hosts was successfully obtained. These bots are no longer in control of the botherder, and, as a result, are no longer involved in sending spam, the primary malicious activity of this botnet. The hosts resided primarily in Poland (24%) and were primarily running the old operating system Windows XP (84%). The command-and-control infrastructure has been abandoned by the gang that was operating the botnet two days after the operation. We can say that the Kelihos.B/Hlux.B botnet was successfully disabled.

For more information, we refer to:
blog.crowdstrike.com/2012/03/p2p-botnet-kelihosb-with-100000-nodes.html
newsroom.kaspersky.eu/en/texts/detail/article/how-kaspersky-lab-and-crowdstrike-dismantled-the-second-hluxkelihos-botnet-success-story/
www.secureworks.com/research/threats/waledac_kelihos_botnet/

  • botnet
  • Kelihos.B/Hlux.B
  • takedown
  • christian.seifert's blog

Rapid7 Sponsors Androguard and Cuckoo Sandbox in the First Round of the Magnificent7 Program

Fri, 03/30/2012 - 09:25 — guillaume.arcas

We are proud and happy to announce that Cuckoo Sandbox and AndroGuard were choosen by Rapid7 for his Magnificent7 Program, an initiative created to fuel the success of seven bleeding edge open source projects and backed by a fund of $100,000.

Cuckoo Sandbox and AndroGuard are respectively developped by Claudio Guarnieri and Anthony Desnos and mentored during previous GSoC.

Congratulations to Claudio and Anthony !

  • cuckoo sandbox androguard gsoc
  • guillaume.arcas's blog
  • Read more

Thoughts on the Microsoft's "Operation b71" (Zeus botnet civil legal action)

Wed, 03/28/2012 - 04:56 — david.dittrich

On Sunday, March 25, Microsoft announced that for the fourth time, they had gone to a federal court and successfully obtained an ex parte temporary restraining order (TRO) to seize domain names from botnet operators. For the second time, the court has also ordered U.S. Marshals to accompany Microsoft and others to serve search warrants and seize evidence that can be used in future civil or criminal actions.

  • botnet
  • ethics
  • legal
  • takedown
  • david.dittrich's blog
  • Read more

Forensic Challenge 11 - "Dive Into Exploit"

Mon, 03/19/2012 - 22:33 — angelo.dellaera

I am pleased to announce a new forensic challenge: Forensic Challenge 11 - "Dive Into Exploit"

The challenge has been created by Georg Wicherski from Giraffe Chapter.

Submission deadline is May 31th and we will be announcing winners (if any) around the last week of June 2012.

Have fun!

Angelo Dell'Aera
The Honeynet Project

  • angelo.dellaera's blog

Low-interaction honeyclient Thug released!

Mon, 03/19/2012 - 22:27 — angelo.dellaera

I'm glad to announce I finally publicly released a brand new low-interaction honeyclient I'm working on from a few months now. The project name is Thug and it was publicly presented a few hours ago during the Honeynet Project Security Workshop in Facebook HQ in Menlo Park. Please take a look at the (attached) presentation for details about Thug.

Just a few highlights about Thug:

  • DOM (almost) compliant with W3C DOM Core and HTML specifications (Level 1, 2 and partially 3) and partially compliant with W3C DOM Events and Style specifications
  • honeyclient
  • low-interaction
  • thug
  • angelo.dellaera's blog
  • Read more
  • 1 attachment
123456789next ›last »
spacer
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.