Category Archive: Malware

Aug 25 2014

DionaeaFR: adding parameterized date range

UPDATE: this change has been merged into the official DionaeaFR repo. As you might know, DionaeaFR is a very good frontend for Dionaea malware honeypot. It is developed by @rubenespadas, is written in Python and uses the Django web framework. I have covered DionaeaFR in the past in my post Visualizing Dionaea’s results with DionaeaFR and of course …

Continue reading »

Jul 26 2014

HoneyDrive 3 Royal Jelly edition

honeydrive_3_logo

Dear security enthusiasts, it’s been around one year and a half since the last release of HoneyDrive Desktop. Upon learning that my honeypots workshop has been accepted at BSides Las Vegas 2014, the thought of upgrading HoneyDrive has been greatly intensified in my mind, to the point that I decided to make it a reality! So, it …

Continue reading »

Jul 23 2014

Vagrant configuration for Thug honeyclient

I am happy to announce another small side-project. This time, I decided to make a Thug honeyclient VM available with one command (no kidding!) I have previously done the same with Dionaea-Vagrant, and while I was working on the next version of HoneyDrive the past days, news came out that Thug 0.5 was released today. …

Continue reading »

Jul 15 2014

Honeypots workshop at BSidesLV 2014!

bsideslv

I am very happy to announce that a honeypots workshop will take place during BSides Las Vegas this year! BSides is a fantastic community driven InfoSec convention and Las Vegas is the best place to be in August! The workshop is titled “You Hack, We Capture: Attack Analysis with Honeypots“, lasts half a day (4 hours) and …

Continue reading »

Jul 13 2014

Dionaea-Vagrant demo

Dionaea-Vagrant demonstration: setting up a Dionaea malware honeypot in under 8 minutes with a single (almost) command!

Link

An (old) interesting paper by Vesselin Bontchev: The Bulgarian and Soviet Virus Factories

Abstract: It is now well known that Bulgaria is leader in computer virus production and the USSR is following closely. This paper tries to answer the main questions: Who makes viruses there, What viruses are made, and Why this is done. It also underlines the impact of this process on the West, as well as on the national software industry.

Video

DEFCON 17: Identifying, Exploring, and Predicting Threats in the Russian Hacker Community

Page 1 of 512345