Camouflaging HoneyD
1:00, July 26th, 2005 by davidCamouflaging Honeyd: A method for camouflaging honeyd has been released by Bryan Graham and Xinwen Fu: http://students.cs.tamu.edu/xinwenfu/honeyd_tamu/
The UK Honeynet Project (a Chapter of The Honeynet Project) was founded in 2002 as a volunteer not-for-profit research organisation. Our aim is to provide information surrounding security threats and vulnerabilities active in the wild on UK networks today, to learn the tools, tactics, and motives of the blackhat community and to share these lessons learned with the public and the wider IT community. The project seeks to provide input as part of an overall honeynet community of teams researching security within IT systems around the globe.
Camouflaging Honeyd: A method for camouflaging honeyd has been released by Bryan Graham and Xinwen Fu: http://students.cs.tamu.edu/xinwenfu/honeyd_tamu/
Honeynet Project Software Testing Centre The Honeynet Project has selected the Singapore Honeynet Project (SIG^2 G-TEC/IWFC Honeynet team) as their official software development test centre. The group will be funded to improve formal software testing methods and to provid a test bed plus testing resources for all Honeynet Project software development over the coming year.
Honeynet Research Alliance charter updated: the Honeynet Project’s Research Alliance charter has been updated: http://www.honeynet.org/alliance/charter.txt
14th USENIX Security Symposium WHAT: 14th USENIX Security Symposium
WHEN: July 31-August 5, 2005
WHERE: Baltimore, MD, Sheraton Inner Harbor Hotel
WHO: Researchers, System Administrators, Policy Wonks, etc.
WHY: To get to and stay on the cutting edge of computer security
HOW: Register NOW at http://www.usenix.org/sec05/progm
iDEFENSE Labs Releases Multipot “Authored by David Zimmer, iDEFENSE Labs is releasing Multipot, an open source emulation based honeypot designed to capture malicious code which spreads through various exploits across the net. Multipot is available for download from: http://labs.idefense.com Multipot was designed to emulate exploitable services to safely collect malicious code. Further information is available in the bundled install file. Process Stalker and OllyDbg Breakpoint Manager were separately updated to address various bugs. More information regarding the changes is available in the respective bundled archives also available on the iDEFENSE Labs website.” Two similar tools are also being actively developed by researchers from the German Honeynet Project and are available here: Nepenthes: http://nepenthes.sourceforge.net MWcollect: http://mwcollect.org (funded by the Honeynet Project)
PacSec/core05 call for papers: Dragos Ruiu’s PacSec/core05 conference will be held in Tokyo on November 15/16 and the call for papers has been issued: http://pacsec.jp/speakers.html?LANG=ENGLISH
Client Honeypot Project: The German Honeynet Project has a student working on a client honeypot their thesis statement, supported by the Honeynet Project. The software will be released under the BSD OpenSource license, copyright the Honeynet Project. For more informaiton see: http://lufgi4.informatik.rwth-aachen.de/diplomas/show/27
RAID 2005: Call for Participation: The world’s premier intrustion detection technology forum. Seattle, Washington, USA September 7-9 http://www.conjungi.com/RAID/