HtmlToText
toggle search form toggle navigation bruteforce lab security, programming, devops, visualization, the cloud home honeydrive kippo-graph kippo2elasticsearch kippo2mysql kippo-malware honeyd-viz honeyd2mysql misc dionaea-vagrant thug-vagrant about me legal disclaimer privacy policy terms and conditions contact form jan 04 2018 down the rabbit hole: how hackers exploit weak ssh credentials to build ddos botnets by ion in honeypots grehack 2017 leave comment aug 30 2017 ipfs, coinlist, and the filecoin ico with juan benet and dalton caldwell by ion in general news filecoin , ipfs leave comment mar 19 2017 new domain by ion in blog news the website has been moved to a new domain: bruteforcelab.com . the old international tld has served me well during all these years, but it’s time to move to a proper .com one and finally add an ssl certificate. 1 comment nov 27 2016 bsides lisbon 2016 – mtls in a microservices world by diogo mónica by ion in general news bsides lisbon 2016 , diogo monica 2 comments jul 21 2016 honeypots workshop at defcon 24 by ion in blog news , general news , honeypots , malware , visualization i am very happy to announce that a honeypots workshop will take place during defcon 24 in las vegas. the workshop is titled “ analyzing internet attacks with honeypots “, lasts half a day (4 hours) and will be presented by me. it takes place on friday the 5th of august, from 2pm to 6pm at las vegas ballroom 3. registration instructions: https://www.defcon.org/html/defcon-24/dc-24-workshops.html here is the workshop’s description: in the field of computer security, honeypots are systems aimed at deceiving malicious users or software that launch attacks against the servers and network infrastructure of various organizations. they can be deployed as protection mechanisms for an organization’s real systems, or as research units to study and analyze the methods employed by human hackers or malware. in this workshop we will outline the operation of two research honeypots, by manual deployment and testing in real time. a honeypot system will undertake the role of a web trap for attackers who target the ssh service in order to gain illegal server access. another one will undertake the role of a malware collector, usually deployed by malware analysts and anti-virus companies to gather and securely store malicious binary samples. we will also talk about post-capturing activities and further analysis techniques. as an example, we will see how to index all the captured information in a search engine like elasticsearch and then utilize elastalert, an easy to use framework to setup meaningful alerting. lastly, visualization tools will be presented for the aforementioned systems, plus a honeypot bundle linux distribution that contains pre-configured versions of the above tools and much more related utilities, which can make the deployment of honeypots in small or large networks an easy task. see you in vegas! defcon 24 , dionaea , dionaeafr , elastalert , honeydrive , kippo , kippo-graph 2 comments apr 06 2016 here’s what happens when an 18 year old buys a mainframe by ion in general news 1 comment feb 25 2016 my bro the elk: obtaining context from security events by ion in general news , security tools blackhat 1 comment 1 2 3 … 30 subscribe to bruteforce lab join 2,882 other subscribers [email protected] bruteforce lab is accepting donations by grateful users, who think the free software we release has given them a benefit. if you like my security work, a donation would be greatly appreciated! popular posts honeydrive kippo-graph bypassing "clang: error: unknown argument" yara: a beginners' guide recent posts down the rabbit hole: how hackers exploit weak ssh credentials to build ddos botnets ipfs, coinlist, and the filecoin ico with juan benet and dalton caldwell new domain bsides lisbon 2016 – mtls in a microservices world by diogo mónica honeypots workshop at defcon 24 archives archives select month january 2018 (1) august 2017 (1) march 2017 (1) november 2016 (1) july 2016 (1) april 2016 (1) february 2016 (1) december 2015 (2) november 2015 (1) august 2015 (1) july 2015 (1) june 2015 (3) march 2015 (2) february 2015 (6) december 2014 (2) november 2014 (1) october 2014 (2) september 2014 (1) august 2014 (5) july 2014 (8) june 2014 (6) april 2014 (1) march 2014 (6) february 2014 (8) january 2014 (2) december 2013 (4) november 2013 (1) october 2013 (3) september 2013 (3) august 2013 (3) july 2013 (3) june 2013 (3) may 2013 (3) april 2013 (3) march 2013 (4) february 2013 (8) january 2013 (14) december 2012 (13) november 2012 (4) october 2012 (9) september 2012 (4) august 2012 (2) july 2012 (1) june 2012 (4) may 2012 (10) april 2012 (3) march 2012 (8) february 2012 (6) january 2012 (12) december 2011 (11) categories blog news (77) cyber warfare (7) devops (5) general news (38) honeypots (115) malware (32) network security (17) programming (11) security countermeasures (8) security tools (8) virtualization (15) visualization (62) web application security (10) like us on facebook like us on facebook blogroll digital forensics blog edgis security infosanity's blog journey into incident response lvdeijk's blog phillips321.co.uk technoskald tekdefense interesting websites /r/netsec dark reading darknet infosec island it security – se packet storm security security affairs server fault organizations center for internet security (cis) conficker working group eu network and information security agency owasp (open web application security project) shadowserver foundation syssec consortium the honeynet project the sans™ institute privacy & cookies: this site uses cookies. by continuing to use this website, you agree to their use. to find out more, including how to control cookies, see here: privacy policy © 2018 bruteforce lab. made with by graphene themes .