Skip to content

Commit

Permalink
Post for new web site (#32)
Browse files Browse the repository at this point in the history
* post for new web site

* fix nit

---------

Co-authored-by: Maximilian Hils <[email protected]>
  • Loading branch information
glaslos and mhils authored Aug 2, 2023
1 parent 115ef2a commit 7366726
Show file tree
Hide file tree
Showing 8 changed files with 29 additions and 69 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ The main objective is to migrate from Wordpress to a static site generator (Hugo
To add a new blog post, run the following command in the root directory of this repository:

```
hugo new blog/YYYY-MM-DD-some-title/index.md
hugo new blog/YYYY/MM/DD/some-title/index.md
```

You can then edit the newly created file with your favorite text editor, and
Expand Down
7 changes: 0 additions & 7 deletions content/blog/2008/09/04/new-blog-space-at-hp/index.md

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -6,10 +6,6 @@ date: "2008-12-07"

Welcome to our new website as we enter the age of Web 2.0.  We have created a more dynamic website to allow our membes to create and publish their own content.  We have so many different activities going on with our various members that it can be challenging even for us to keep up.  The goal is that each member can now publish and share with the community whenever they like.  In addition we still have all the old content on the website.  We are still in the process of moving some content over, such as some of our KYE papers.  If you find content missing, a broken link or have any suggestions, please email us at [email protected].



I would like to give a personaly thanks to Jamie Riden, Markus Koetter, Steve Mumford, David Watson and many others who made this website, and our infrastructure possible.  Once again, thanks!



\- Lance Spitzner, president.
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,6 @@
title: "Introducing Glastopf, a Web Application Honeypot"
authors: ["Lukas Rist"]
date: "2009-05-27"
categories:
- "analysis"
- "gsoc"
- "honeypot"
tags:
- "glastopf"
- "gsoc"
Expand All @@ -14,18 +10,10 @@ tags:

Hello, this initial blog post is used to introduce me and to provide a brief overview of [my GSoC Project](/gsoc/project8 "Glastopf GSoC Project").



My name is Lukas Rist (my personal [blog](http://glasblog.1durch0.de/ "GlasBlog")) and I am currently studying Math and Physics at the [University of Kaiserslauter](http://www.uni-kl.de/ "TU Kaiserslautern") in Germany. This is my first time in GSoC and I will be working with [Thorsten Holz](http://honeyblog.org/) on Glastopf, a Web Application Honeypot.



Glastopf is a minimalistic web server emulator written in Python. The honeypot tool collects information about web application-based attacks like for example [remote file inclusion](http://en.wikipedia.org/wiki/Remote_File_Inclusion "RFI"), [SQL injection](http://en.wikipedia.org/wiki/Sql_injection "SQL Injection"), and [local file inclusion](http://en.wikipedia.org/wiki/Code_injection#Include_File_Injection "LFI") attacks.



The [Glastopf Project](http://trac.1durch0.de/trac/ "Glastopf Trac") was founded before the GSoC, thus a running version of the system is already available. Actually I am improving the central database which holds the collected data from a small number of Glastopf nodes. A big part of my work during the participation will be the analysis of a large amount of collected data. Due to the fact that there is no other tool with comparable capabilities, the first results are astonishing and they are promising a lot of fun in the coming months!

The [Glastopf Project](http://trac.1durch0.de/trac/ "Glastopf Trac") was founded before the GSoC, thus a running version of the system is already available. Actually I am improving the central database which holds the collected data from a small number of Glastopf nodes. A big part of my work during the participation will be the analysis of a large amount of collected data. Due to the fact that there is no other tool with comparable capabilities, the first results are astonishing and they are promising a lot of fun in the coming months!

If you are interested in quantitative results from the central database and if you are a fan of fancy Web 2.0 services, check out my Glastopf Twitter feed at [http://twitter.com/glastopf](http://twitter.com/glastopf)
Original file line number Diff line number Diff line change
Expand Up @@ -8,55 +8,17 @@ tags:
- "tool"
---

Here is another tool release from The Honeynet Project: Cuckoo Box by Claudio Guarnieri. Cuckoo is a binary analysis sandbox, designed and developed with the general purpose of automating the analysis of malware. Read more about the tool [here](https://honeynet.org/project/Cuckoo), grab the tool [here](http://www.cuckoobox.org/download.php) – but please read detailed setup guide [here](http://www.cuckoobox.org/doc/setup.html) (make sure to read it!). BTW, this tool is really well-documented, so make use of it before deploying it.



Here is another tool release from The Honeynet Project: Cuckoo Box by Claudio Guarnieri. Cuckoo is a binary analysis sandbox, designed and developed with the general purpose of automating the analysis of malware. Read more about the tool [here](https://cuckoosandbox.org/), grab the tool [here](https://cuckoosandbox.org/downloadp) – but please read detailed setup guide [here](https://cuckoo.sh/docs/) (make sure to read it!). BTW, this tool is really well-documented, so make use of it before deploying it.

Cuckoo is a lightweight solution that performs automated dynamic analysis of provided Windows binaries. It is able to return comprehensive reports on key API calls and network activity. Current features are:





- Retrieve files from remote URLs and analyze them.


- Trace relevant API calls for behavioral analysis.


- Recursively monitor newly spawned processes.


- Dump generated network traffic.


- Run concurrent analysis on multiple machines.


- Support custom analysis package based on AutoIt3 scripting.


- Intercept downloaded and deleted files.


- Take screenshots during runtime.





Please [try the tool](https://honeynet.org/project/Cuckoo) and send the feedback [to the author](http://www.cuckoobox.org/contacts.php) – or sign up for a mailing list devoted to this tool [here](https://public.honeynet.org/mailman/listinfo/cuckoo).




**Possibly related posts**:







- [The Honeynet Project Releases New Tool: PhoneyC](http://chuvakin.blogspot.com/2011/02/honeynet-project-releases-new-tool.html)
Please [try the tool](https://cuckoosandbox.org/) and send the feedback [to the author](https://cuckoosandbox.org/) – or sign up for a mailing list devoted to this tool [here](https://public.honeynet.org/mailman/listinfo/cuckoo).
5 changes: 2 additions & 3 deletions content/blog/2011/07/14/droidbox-alpha-release/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,6 @@
title: "DroidBox: alpha release"
authors: ["Patrik Lantz"]
date: "2011-07-14"
categories:
- "android"
- "encryption"
tags:
- "android"
- "droidbox"
Expand All @@ -26,6 +23,7 @@ At the moment, the following actions are logged during runtime:

An analysis output looks like the following sample report:

```
``____ __ ____ /\ _`\ [alpha] __ /\ \/\ _`\ \ \ \/\ \ _ __ ___ /\_\ \_\ \ \ \L\ \ ___ __ _ \ \ \ \ \/\`'__\ __`\/\ \ /'_` \ \ _ <' / __`\/\ \/'\ \ \ \_\ \ \ \/\ \L\ \ \ \/\ \L\ \ \ \L\ \ \L\ \/> \ \____/\ \_\ \____/\ \_\ \___,_\ \____/ \____//\_/\_\ \/___/ \/_/\/___/ \/_/\/__,_ /\/___/ \/___/ \//\/_/ ^C [*] Collected 36 sandbox logs``
`[File activities] -----------------
Expand Down Expand Up @@ -77,6 +75,7 @@ An analysis output looks like the following sample report:
[Sent SMS] ---------- [1310660575.45] Number: 0735445281 Message: Sending sms...
``[Phone calls] ------------- [1310660575.48] Number: 123456789 [1310660575.83] Number: 123456789`
```

The development continues with static analysis of Android packages. More specifically, permissions, activities and registered Intent receivers are to be parsed from the Manifest file to coordinate with the dynamic analysis. Some of the features planned to be implemented are:

Expand Down
22 changes: 22 additions & 0 deletions content/blog/2023/08/01/new-web-site/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
title: "Our New Web Site"
date: 2023-07-31
authors: ["Lukas Rist"]
tags: ["announcement"]
---

It has been almost 15 years since Lance [announced]({{< ref "blog/2008/08/12/our-new-website" >}}) our new web site on August 12th 2008. While you are already enjoying the pleasures of our now home, read on for a quick tour...

<!--more-->

The Honeynet Project had since its inception [Awareness]({{< ref "about.md#awareness" >}}) as one of its main pillars of existence, and our website is our main gateway into our work and community:

We have a collection of in-depth technical [papers]({{< ref "papers.md" >}}) ranging from topics like [Containing Conficker]({{< ref "papers/2009/03/30/know-your-enemy-containing-conficker/index.md" >}}), over [Quebec]({{< ref "papers/2010/11/03/know-your-tools-qebek-conceal-the-monitoring/index.md" >}}) to [The Social Dynamics of Hacking]({{< ref "papers/2012/05/29/know-your-enemy-the-social-dynamics-of-hacking/index.md" >}}) taking us along for a ride to understand how the skills, motives, and social relationships shape the actions of individual attackers.

Since [2009]({{< ref "gsoc/gsoc-2009/" >}}) we are participating in the [Google Summer of Code]((https://summerofcode.withgoogle.com/)) an effort together with Google to introduce students to Open Source and the world of information security. This lead to amazing project like the malware analysis sandbox [Cuckoo]({{< ref "blog/2011/02/23/the-honeynet-project-releases-new-tool-cuckoo/index.md" >}}), the web application honeypot [Glastopf]({{< ref "blog/2009/05/27/introducing-glastopf-a-web-application-honeypot/index.md" >}}), and [DroidBox]({{< ref "blog/2011/07/14/droidbox-alpha-release/index.md" >}}) for dynamic APK analysis. We are participating again [this year]({{< ref "gsoc/gsoc-2023/" >}}), so stay tuned for the project reports coming soon.

With already 14 [challenges]({{< ref "challenges/" >}}) available, we have a treasure trove of exercises from entry to expert level difficulties. I'm sure I can interest you in an adventure into [steganography]({{< ref "challenges/2013/04/08/forensic-challenge-13-a-message-in-a-picture/index.md" >}}) or a deep dive into [Python bytecode]({{< ref "challenges/2015/03/18/forensic-challenge-14-weird-python/index.md" >}}).

To round it up, let me tell you about our [annual workshops]({{< ref "workshops" >}}) consisting of a conference with cyber deception experts from around the world offering their latest research and findings and teaching you the craft of catching the attackers in sticky honeypots. Have an eye out for what is happening [here](https://denmark2024.honeynet.org/).

Big thanks to Maximilian Hils, Abhinav Saxena, and our infrastructure team for helping making our new web site possible.
2 changes: 1 addition & 1 deletion content/gsoc/gsoc-2009/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ date: "2009-03-12"

* * *

The Honeynet Project is very passionate about being accepted to be a mentor organization in the Google Summer of Code 2009.  You can view our proposed list of [GSoC 2009 project ideas here]({{< ref "ideas.md" >}}) (student were also free to propose their own ideas, and may did) plus you can view the list of project applications accepted for [GSoC 2009 allocated slots here.](/gsoc/slots "GSoC 2009 Slots") We'll be posting more details about the progress made in GSoC 2009 in the coming weeks, and making regular [blog posts](/aggregator "Blog"). If you are unfamiliar with Google Summer of Code, learn more at the [GSoC Website](http://socghop.appspot.com/).
The Honeynet Project is very passionate about being accepted to be a mentor organization in the Google Summer of Code 2009.  You can view our proposed list of [GSoC 2009 project ideas here]({{< ref "ideas.md" >}}) (student were also free to propose their own ideas, and may did) plus you can view the list of project applications accepted for [GSoC 2009 allocated slots here.](/gsoc/slots "GSoC 2009 Slots") We'll be posting more details about the progress made in GSoC 2009 in the coming weeks, and making regular [blog posts](/feed "Blog"). If you are unfamiliar with Google Summer of Code, learn more at the [GSoC Website](http://socghop.appspot.com/).

## Why get involved with the Honeynet Project and GSOC 2009?

Expand Down

0 comments on commit 7366726

Please sign in to comment.