Date Author Title

HONEYPOT INSTALL UBUNTU RASPBERRY PI

2020-06-25Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.

HONEYPOT

2024-12-09/a>Jesse La GrewCURLing for Crypto on Honeypots
2024-11-06/a>Jesse La Grew[Guest Diary] Insights from August Web Traffic Surge
2024-09-13/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-06/a>Jesse La GrewEnrichment Data: Keeping it Fresh
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-25/a>Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07/a>Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03/a>Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-25/a>Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-18/a>Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-30/a>Johannes UllrichWhat did I say to make you stop talking to me?
2024-01-17/a>Jesse La GrewNumber Usage in Passwords
2023-12-27/a>Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-13/a>Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-27/a>Guy BruneauDecoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-09-14/a>Jesse La GrewDShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-09/a>Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2023-09-02/a>Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-12/a>Guy BruneauDShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-06/a>Jesse La GrewIDS Comparisons with DShield Honeypot Data
2023-06-11/a>Guy BruneauDShield Honeypot Activity for May 2023
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-04-17/a>Jan KoprivaThe strange case of Great honeypot of China
2023-01-31/a>Jesse La GrewDShield Honeypot Setup with pfSense
2022-12-29/a>Jesse La GrewOpening the Door for a Knock: Creating a Custom DShield Listener
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-09-12/a>Johannes UllrichVirusTotal Result Comparisons for Honeypot Malware
2022-08-18/a>Johannes UllrichHoneypot Attack Summaries with Python
2022-06-15/a>Johannes UllrichTerraforming Honeypots. Installing DShield Sensors in the Cloud
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2021-01-15/a>Guy BruneauObfuscated DNS Queries
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-07-01/a>Jim ClausingSetting up the Dshield honeypot and tcp-honeypot.py
2020-06-28/a>Guy Bruneautcp-honeypot.py Logstash Parser & Dashboard Update
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-20/a>Tom WebbPi Zero HoneyPot
2020-06-05/a>Remco VerhoefNot so FastCGI!
2020-05-01/a>Jim ClausingAttack traffic on TCP port 9673
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2018-11-09/a>Tom WebbPlaying with T-POT
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-07-27/a>Xavier MertensTinyPot, My Small Honeypot
2017-03-12/a>Guy BruneauHoneypot Logs and Tracking a VBE Script
2017-02-21/a>Jim ClausingQuick and dirty generic listener
2016-12-31/a>Xavier MertensOngoing Scans Below the Radar
2016-11-13/a>Guy BruneauBitcoin Miner File Upload via FTP
2016-07-07/a>Johannes UllrichPatchwork: Is it still "Advanced" if all you have to do is Copy/Paste?
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-04-27/a>Tom WebbKippos Cousin Cowrie
2016-03-15/a>Xavier MertensDockerized DShield SSH Honeypot
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy
2015-04-14/a>Johannes UllrichOdd POST Request To Web Honeypot
2014-07-31/a>Chris MohanA Honeypot for home: Raspberry Pi
2014-06-30/a>Johannes UllrichShould I setup a Honeypot? [SANSFIRE]
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2013-07-25/a>Johannes UllrichA Couple of SSH Brute Force Compromises
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2010-11-05/a>Adrien de BeaupreBot honeypot
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-09-18/a>Jason LamResults from Webhoneypot project
2009-06-11/a>Jason LamDshield Web Honeypot going beta
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-02-17/a>Jason LamDShield Web Honeypot - Alpha Preview Release
2008-12-01/a>Jason LamCall for volunteers - Web Honeypot Project

INSTALL

2021-04-09/a>Xavier MertensNo Python Interpreter? This Simple RAT Installs Its Own Copy
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2016-05-21/a>Didier StevensPython Malware - Part 2
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell

UBUNTU

2024-04-16/a>Yee Ching TokRolling Back Packages on Ubuntu/Debian
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2014-04-28/a>Russ McReeUbuntu 14.04 lockscreen bypass
2013-07-21/a>Guy BruneauUbuntu Forums Security Breach
2013-05-20/a>Johannes UllrichUbuntu Package available to submit firewall logs to DShield
2010-07-08/a>Kyle HaugsnessUbuntu privilege escalation via PAM
2009-03-13/a>Mark HofmanUbuntu users, today is a good day to patch
2008-11-29/a>Pedro BuenoUbuntu users: Time to update!

RASPBERRY

2022-08-30/a>Johannes UllrichTwo things that will never die: bash scripts and IRC!
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC

PI

2024-08-29/a>Xavier MertensLive Patching DLLs with Python
2024-08-22/a>Johannes UllrichOpenAI Scans for Honeypots. Artificially Malicious? Action Abuse?
2024-05-22/a>Rob VandenBrinkNMAP Scanning without Scanning (Part 2) - The ipinfo API
2024-03-29/a>Xavier MertensQuick Forensics Analysis of Apache logs
2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-12-23/a>Xavier MertensPython Keylogger Using Mailtrap.io
2023-12-15/a>Xavier MertensCSharp Payload Phoning to a CobaltStrike Server
2023-07-21/a>Rob VandenBrinkShodan's API For The (Recon) Win!
2023-04-07/a>Xavier MertensDetecting Suspicious API Usage with YARA Rules
2023-03-25/a>Guy BruneauMicrosoft Released an Update for Windows Snipping Tool Vulnerability
2023-03-22/a>Didier StevensWindows 11 Snipping Tool Privacy Bug: Inspecting PNG Files
2023-02-15/a>Rob VandenBrinkDNS Recon Redux - Zone Transfers (plus a time machine) for When You Can't do a Zone Transfer
2022-12-19/a>Xavier MertensHunting for Mastodon Servers
2022-08-30/a>Johannes UllrichTwo things that will never die: bash scripts and IRC!
2022-06-21/a>Johannes UllrichExperimental New Domain / Domain Age API
2022-05-24/a>Yee Ching Tokctx Python Library Updated with "Extra" Features
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2022-03-18/a>Johannes UllrichScans for Movable Type Vulnerability (CVE-2021-20837)
2022-03-10/a>Xavier MertensCredentials Leaks on VirusTotal
2022-02-25/a>Didier StevensWindows, Fixed IPv4 Addresses and APIPA
2022-01-21/a>Xavier MertensObscure Wininet.dll Feature?
2021-12-17/a>Rob VandenBrinkDR Automation - Using Public DNS APIs
2021-09-09/a>Johannes UllrichUpdates to Our Datafeeds/API
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2021-07-24/a>Xavier MertensAgent.Tesla Dropped via a .daa Image and Talking to Telegram
2021-06-19/a>Xavier MertensEasy Access to the NIST RDS Database
2021-06-11/a>Xavier MertensKeeping an Eye on Dangerous Python Modules
2021-06-09/a>Jan KoprivaArchitecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files"
2021-05-08/a>Guy BruneauWho is Probing the Internet for Research Purposes?
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-03-17/a>Xavier MertensDefenders, Know Your Operating System Like Attackers Do!
2021-03-11/a>Johannes UllrichPiktochart - Phishing with Infographics
2021-01-07/a>Rob VandenBrinkUsing the NIST Database and API to Keep Up with Vulnerabilities and Patches (Part 1 of 3)
2020-12-22/a>Xavier MertensMalware Victim Selection Through WiFi Identification
2020-12-05/a>Guy BruneauIs IP 91.199.118.137 testing Access to aahwwx.52host.xyz?
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-08-18/a>Xavier MertensUsing API's to Track Attackers
2020-07-28/a>Johannes UllrichAll I want this Tuesday: More Data
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-20/a>Tom WebbPi Zero HoneyPot
2020-05-29/a>Johannes UllrichThe Impact of Researchers on Our Data
2020-05-21/a>Xavier MertensMalware Triage with FLOSS: API Calls Based Behavior
2020-03-31/a>Johannes UllrichKwampirs Targeted Attacks Involving Healthcare Sector
2020-02-29/a>Guy BruneauHazelcast IMDG Discover Scan
2020-02-17/a>Didier Stevenscurl and SSPI
2020-01-16/a>Bojan ZdrnjaSumming up CVE-2020-0601, or the Let?s Decrypt vulnerability
2019-12-29/a>Guy BruneauELK Dashboard for Pihole Logs
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-08-28/a>Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-05-16/a>Xavier MertensThe Risk of Authenticated Vulnerability Scans
2019-03-15/a>Remco VerhoefBinary Analysis with Jupyter and Radare2
2019-02-26/a>Russ McReeAd Blocking With Pi Hole
2019-01-21/a>Didier StevensSuspicious GET Request: Do You Know What This Is?
2019-01-10/a>Brad DuncanHeartbreaking Emails: "Love You" Malspam
2018-11-18/a>Guy BruneauMultipurpose PCAP Analysis Tool
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-11-12/a>Rick WannerUsing the Neutrino ip-blocklist API to test general badness of an IP
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-07-21/a>Didier StevensBTC pickpockets are back
2017-11-17/a>Xavier MertensTop-100 Malicious IP STIX Feed
2017-10-06/a>Johannes UllrichWhat's in a cable? The dangers of unauthorized cables
2017-09-05/a>Adrien de BeaupreStruts vulnerability patch released by apache, patch now
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-05-10/a>Johannes UllrichRead This If You Are Using a Script to Pull Data From This Site
2017-05-08/a>Renato MarinhoExploring a P2P Transient Botnet - From Discovery to Enumeration
2017-01-10/a>Johannes UllrichPort 37777 "MapTable" Requests
2017-01-07/a>Xavier MertensUsing Security Tools to Compromize a Network
2016-08-22/a>Russ McReeRed Team Tools Updates: hashcat and SpiderFoot
2015-09-03/a>Xavier MertensQuerying the DShield API from RTIR
2015-03-26/a>Daniel WesemannPin-up on your Smartphone!
2014-05-28/a>Rob VandenBrinkAssessing SOAP APIs with Burp
2014-04-01/a>Basil Alawi S.TaherUpgrading Your Android, Elevating My Malware
2014-03-12/a>Johannes UllrichWordpress "Pingback" DDoS Attacks
2014-02-18/a>Johannes UllrichMore Details About "TheMoon" Linksys Worm
2014-02-10/a>Rob VandenBrinkIsn't it About Time to Get Moving on Chip and PIN?
2014-02-04/a>Johannes UllrichOdd ICMP Echo Request Payload
2014-01-20/a>Rob VandenBrinkYou Can Run, but You Can't Hide (SSH and other open services)
2013-12-19/a>Rob VandenBrinkTarget US - Credit Card Data Breach
2013-12-12/a>Basil Alawi S.TaherAcquiring Memory Images with Dumpit
2013-12-01/a>Richard PorterBPF, PCAP, Binary, hex, why they matter?
2013-11-04/a>Manuel Humberto Santander PelaezWhen attackers use your DNS to check for the sites you are visiting
2013-10-25/a>Rob VandenBrinkKaspersky flags TCPIP.SYS as Malware
2013-03-27/a>Adam SwangerIPv6 Focus Month: Guest Diary: Stephen Groat - IPv6 moving target defense
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-22/a>Johannes UllrichZendesk breach affects Tumblr/Pinterest/Twitter
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-11-16/a>Guy BruneauVMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-07-21/a>Rick WannerTippingPoint DNS Version Request increase
2012-06-25/a>Rick WannerTargeted Malware for Industrial Espionage?
2011-12-07/a>Lenny ZeltserV8 as an Alternative to SpiderMonkey for JavaScript Deobfuscation
2011-09-29/a>Daniel WesemannThe SSD dilemma
2011-08-13/a>Rick WannerMoonSols Dumpit released...for free!
2011-08-08/a>Rob VandenBrinkPing is Bad (Sometimes)
2011-06-09/a>Richard PorterOne Browser to Rule them All?
2011-05-01/a>Deborah HaleAnother Potentially Malicious Email Making The Rounds
2011-02-08/a>Johannes UllrichTippingpoint Releases Details on Unpatched Bugs
2010-12-25/a>Manuel Humberto Santander PelaezAn interesting vulnerability playground to learn application vulnerabilities
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-11-18/a>Chris CarboniAll of your pages are belonging to us
2010-07-21/a>Adrien de BeaupreUpdate on .LNK vulnerability
2010-07-08/a>Kyle HaugsnessPirate Bay account database compromised
2010-06-29/a>Johannes UllrichHow to be a better spy: Cyber security lessons from the recent russian spy arrests
2010-06-14/a>Manuel Humberto Santander PelaezAnother way to get protection for application-level attacks
2010-03-30/a>Pedro BuenoSharing the Tools
2010-02-10/a>Johannes UllrichTwitpic, EXIF and GPS: I Know Where You Did it Last Summer
2010-01-25/a>William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2009-08-21/a>Rick WannerInteresting malware...affecting the Delphi Compiler?
2009-03-10/a>Swa Frantzenconspiracy fodder: pifts.exe
2008-10-01/a>Rick WannerHandler Mailbag
2008-07-14/a>Daniel WesemannObfuscated JavaScript Redux
2008-06-18/a>Marcus SachsOlympics Part II