bruteforce.gr Open in urlscan Pro
81.181.108.242  Public Scan

Submitted URL: http://bruteforce.gr/
Effective URL: https://bruteforce.gr/
Submission: On September 21 via manual from DE — Scanned from GB

Form analysis 3 forms found in the DOM

GET /

<form id="searchform" class="searchform" method="get" action="/">
  <p class="clearfix default_searchform">
    <input type="text" name="s" onblur="if (this.value == '') {this.value = 'Search';}" onfocus="if (this.value == 'Search') {this.value = '';}" value="Search">
    <button type="submit"><span>Search</span></button>
  </p>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-2">
  <div id="subscribe-text">
    <p>Enter your email address to receive notifications of new posts!</p>
  </div>
  <p>Join 370 other subscribers</p>
  <p id="subscribe-email">
    <label id="jetpack-subscribe-label" for="subscribe-field-blog_subscription-2" style="clip: rect(1px, 1px, 1px, 1px); position: absolute; height: 1px; width: 1px; overflow: hidden;"> Email Address: </label>
    <input type="email" name="email" required="required" class="required" value="" id="subscribe-field-blog_subscription-2" placeholder="">
  </p>
  <p id="subscribe-submit">
    <input type="hidden" name="action" value="subscribe">
    <input type="hidden" name="source" value="http://bruteforce.gr/">
    <input type="hidden" name="sub-type" value="widget">
    <input type="hidden" name="redirect_fragment" value="blog_subscription-2">
    <input type="submit" value="Subscribe" name="jetpack_subscriptions_widget">
  </p>
</form>

POST https://www.paypal.com/cgi-bin/webscr

<form action="https://www.paypal.com/cgi-bin/webscr" method="post">
  <div class="paypal-donations">
    <input type="hidden" name="cmd" value="_donations">
    <input type="hidden" name="bn" value="TipsandTricks_SP">
    <input type="hidden" name="business" value="ikoniaris@gmail.com">
    <input type="hidden" name="item_name" value="BruteForce.gr">
    <input type="hidden" name="currency_code" value="EUR">
    <input type="image" src="en_US/i/btn/btn_donateCC_LG.gif" name="submit" alt="PayPal - The safer, easier way to pay online.">
    <img alt="" src="en_US/i/scr/pixel.gif" width="1" height="1">
  </div>
</form>

Text Content

Search


BRUTEFORCE LAB'S BLOG


SECURITY, PROGRAMMING, DEVOPS, VISUALIZATION, THE CLOUD

 * Home Main page
 * HoneyDriveHoneypots in a box!
 * Kippo-GraphVisualize Kippo data
 * Kippo2ElasticSearchVisualize Kippo data with Kibana
 * Kippo-MalwareDownload Kippo's files
 * Kippo2MySQLKippo logs to MySQL
 * Dionaea-VagrantSingle-command Dionaea
 * Thug-VagrantSingle-command Thug
 * Honeyd-VizVisualize Honeyd data
 * Honeyd2MySQLhoneyd.log to MySQL
 * MiscellaneousOther projects
   * DeltaBot
   * GrokDebug-Vagrant
   * phpBrowserStack
   * phpMetascan
   * pyMetascan
 * About Mewhoami
 * Contact FormLeave feedback!


 

Video

BSides Lisbon 2016 - MTLS in a Microservices World by Diogo Mónica



Posted on:
November 27, 2016

Jul 21 2016


HONEYPOTS WORKSHOP AT DEFCON 24

Categories:

Blog News, General News, Honeypots, Malware, Visualization

by Ion

I am very happy to announce that a honeypots workshop will take place
during DEFCON 24 in Las Vegas.

The workshop is titled “Analyzing Internet Attacks with Honeypots“, lasts half a
day (4 hours) and will be presented by me.

It takes place on Friday the 5th of August, from 2PM to 6PM at Las Vegas
Ballroom 3.

Registration
instructions: https://www.defcon.org/html/defcon-24/dc-24-workshops.html

Here is the workshop’s description:

> In the field of computer security, honeypots are systems aimed at deceiving
> malicious users or software that launch attacks against the servers and
> network infrastructure of various organizations. They can be deployed as
> protection mechanisms for an organization’s real systems, or as research units
> to study and analyze the methods employed by human hackers or malware. In this
> workshop we will outline the operation of two research honeypots, by manual
> deployment and testing in real time. For example, here is a random article we
> could setup honeypots on: socks for circulation problems. See what we did
> here? We simply link to the articles after putting our honeypot software on
> them. Then bots and crawlers see the articles and any software may attempt to
> interact with the server that website is hosted on. A honeypot system will
> undertake the role of a web trap for attackers who target the SSH service in
> order to gain illegal server access. Another one will undertake the role of a
> malware collector, usually deployed by malware analysts and anti-virus
> companies to gather and securely store malicious binary samples. This is
> common on big ecommerce pages like this Amazon rose toy page and this Amazon
> vegan prenatal vitamins page. We will also talk about post-capturing
> activities and further analysis techniques. As an example, we will see how to
> index all the captured information in a search engine like Elasticsearch and
> then utilize ElastAlert, an easy to use framework to setup meaningful
> alerting. Lastly, visualization tools will be presented for the aforementioned
> systems, plus a honeypot bundle Linux distribution that contains
> pre-configured versions of the above tools and much more related utilities,
> which can make the deployment of honeypots in small or large networks an easy
> task.

See you in Vegas!

Tags: Defcon 24, Dionaea, DionaeaFR, ElastAlert, HoneyDrive, Kippo, Kippo-Graph



Video

Here’s What Happens When an 18 Year Old Buys a Mainframe



Posted on:
April 6, 2016

Video

My Bro The ELK: Obtaining Context From Security Events



Posted on:
February 25, 2016

Video

BSidesSLC 2015 — Security Onions and Honey Potz — Ethan Dodge



Posted on:
December 29, 2015

Video

HNW2015 - Hugo Gonzalez - Android Botnets: Past, Present and Future



Posted on:
December 3, 2015

Video

A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013



Posted on:
November 7, 2015

Page 1 of 3112345...102030...»Last »


SUBSCRIBE TO BRUTEFORCE LAB

Enter your email address to receive notifications of new posts!

Join 370 other subscribers

Email Address:



BruteForce Lab is accepting donations by grateful users, who think the free
software we release has given them a benefit. If you like my work, a donation
would be greatly appreciated! - Ion.




POPULAR POSTS

 * HoneyDrive
 * Kippo-Graph
 * Bypassing "clang: error: unknown argument"
 * Using KeePass on Mac OS X


RECENT POSTS

 * BSides Lisbon 2016 - MTLS in a Microservices World by Diogo Mónica
 * Honeypots workshop at Defcon 24
 * Here’s What Happens When an 18 Year Old Buys a Mainframe
 * My Bro The ELK: Obtaining Context From Security Events
 * BSidesSLC 2015 — Security Onions and Honey Potz — Ethan Dodge


ARCHIVES

Archives Select Month November 2016  (1) July 2016  (1) April 2016  (1) February
2016  (1) December 2015  (2) November 2015  (1) August 2015  (1) July 2015  (1)
June 2015  (3) March 2015  (2) February 2015  (6) December 2014  (2) November
2014  (1) October 2014  (2) September 2014  (1) August 2014  (5) July 2014  (8)
June 2014  (6) April 2014  (1) March 2014  (6) February 2014  (8) January 2014
 (2) December 2013  (4) November 2013  (1) October 2013  (3) September 2013  (3)
August 2013  (3) July 2013  (3) June 2013  (3) May 2013  (3) April 2013  (3)
March 2013  (4) February 2013  (8) January 2013  (14) December 2012  (13)
November 2012  (5) October 2012  (9) September 2012  (4) August 2012  (2) July
2012  (1) June 2012  (4) May 2012  (10) April 2012  (3) March 2012  (8) February
2012  (6) January 2012  (14) December 2011  (11) November 2011  (2) September
2011  (1) August 2011  (3) July 2011  (2)


CATEGORIES

 * Blog News (76)
 * Cyber Warfare (9)
 * DevOps (5)
 * General News (40)
 * Honeypots (115)
 * Malware (34)
 * Network Security (17)
 * Programming (12)
 * Security Countermeasures (9)
 * Security Tools (10)
 * Virtualization (15)
 * Visualization (62)
 * Web Application Security (11)

> 




My Tweets


BLOGROLL

 * Digital Forensics Blog
 * Edgis Security
 * Infosanity's Blog
 * Journey Into Incident Response
 * Lvdeijk's Blog
 * Phillips321.co.uk
 * Technoskald
 * TekDefense


INTERESTING WEBSITES

 * /r/netsec
 * Dark Reading
 * Darknet
 * Infosec Island
 * IT Security – SE
 * Packet Storm Security
 * Security Affairs
 * Server Fault


ORGANIZATIONS

 * Center for Internet Security (CIS)
 * Conficker Working Group
 * EU Network and Information Security Agency
 * OWASP (Open Web Application Security Project)
 * Shadowserver Foundation
 * SysSec Consortium
 * The Honeynet Project
 * The SANS™ Institute


COPYRIGHT

Except where otherwise noted, content on this site is licensed under a Creative
Commons License.

Creative Commons License BY-NC-ND

 * Return to top

Powered by WordPress and the Graphene Theme.