Welcome to the UK Honeynet Project

The UK Honeynet Project (a Chapter of The Honeynet Project) was founded in 2002 as a volunteer not-for-profit research organisation. Our aim is to provide information surrounding security threats and vulnerabilities active in the wild on UK networks today, to learn the tools, tactics, and motives of the blackhat community and to share these lessons learned with the public and the wider IT community. The project seeks to provide input as part of an overall honeynet community of teams researching security within IT systems around the globe.

“Web application attacks” article published in Network Security (Part 1)

15:47, October 23rd, 2007 by david

The October edition of Elsevier’s Network Security publication contains part one of an article on web application attacks written by David Watson of the UK Honeynet Project, with the second part to follow in November.

PacSec07 schedule announced

10:50, October 22nd, 2007 by david

The line-up for this years PacSec07 conference in Tokyo on November the 29th was announced today, and will include a presentation on deploying and operating a global distributed honeynet by David Watson of the UK Honeynet Project. This presentation will follow up on previous EuSec and CanSec lightning talks about GDH and will hopefully coincide with the release of more public information about the GDH research initiative.

BBC News “Identity Fraud” interview

18:47, October 14th, 2007 by david

David Watson was interviewed this week by BBC News, for piece on identity theft and attacks against Internet users.

Honeynet Project annual status report published

10:23, October 8th, 2007 by david

The Honeynet Project published it’s annual status report today, which includes a round up the R&D activity undertaken by members during the previous year. Details of some UK Honeynet Project are also included.

Version 2 of Capture-HPC client honeypot released

15:41, September 14th, 2007 by david

The New Zealand Honeynet Project have been busy with version two of their Capture-HPC client honeypot application, which we use internally for crawling and analysis of suspect URLs. Some of the new features include:

* support for any client application that is http protocol aware (for example, Microsoft Excel)

* ability to automatically collect malware

* ability to automatically collect network traffic on the client

* ability to push exclusion lists from the Capture Server to the Capture Client

* improved control of Internet Explorer: obtain HTML error codes; specify visitation delay after page has been retrieved; retry visitation of URLs in case of time outs or network errors)

* support for plug-in architecture, that allows to create fine grained control of clients (for example, as provided for Internet Explorer), but also allows for integration of client applications that require complex interactions to retrieve content from the web ( e.g. Safari is such an application. It doesn’t allow retrieval of web content by passing the URL as a parameter)

Highly recommended if you are interested in research in this area, as it is very actively maintained and has been effective in our experience.

Lance Spitzner HITB keynote

15:07, September 6th, 2007 by david

Lance Spitzner was one of the keynote speakers at Hack-In-The-Box 2007 in Malaysia this week, and talked about some of the research we have been involved in recently (including the Honeynet Project’s Global Distributed Honeynet initiative – GDH, which David led). More details can be found at the conference web site.

Visualising IRC data

19:49, August 30th, 2007 by arthur

I’ve wanted to post this graph for a while but only just got round to anonymising the data.

Looking at piles of IRC logs can be very unilluminating, but it’s not obvious what to do with all the data. One nice way of getting a handle on links between channels is to plot channels with links between them weighted by the number of users in common.


The example above is from a honeynet we ran in 2004/5. The graph shows up a couple of things nicely:

1) There are two distinct groups of channels, and a look at the data shows that there two groups correspond to channels in different languages and,
2) The strong links between a couple of channels in the main group show up that these channels are related and looking at the data shows them to be used for discussing hacking, while the other channels are innocuous.

The original channel names have been replaced by ‘cN’ to protect the guilty.

Interesting Google Tech Talk

11:53, August 30th, 2007 by arthur

There’s an interesting Google Tech Talk by Ross Anderson on ‘Searching for Evil’ about his work on looking at how “evildoers” network and the implications this has.

http://video.google.com/videoplay?docid=-1380463341028815296