Date Author Title

SSH PROXY HONEYPOT COWRIE

2016-03-13Xavier MertensSSH Honeypots (Ab)used as Proxy

SSH

2024-07-23/a>Johannes UllrichNew Exploit Variation Against D-Link NAS Devices (CVE-2024-3273)
2024-07-01/a>Johannes UllrichSSH "regreSSHion" Remote Code Execution Vulnerability in OpenSSH.
2024-04-01/a>Bojan ZdrnjaThe amazingly scary xz sshd backdoor
2024-01-02/a>Johannes UllrichFingerprinting SSH Identification Strings
2022-12-03/a>Guy BruneauLinux LOLBins Applications Available in Windows
2022-07-23/a>Guy BruneauAnalysis of SSH Honeypot Data with PowerBI
2022-02-01/a>Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2022-01-16/a>Guy Bruneau10 Most Popular Targeted Ports in the Past 3 Weeks
2021-11-08/a>Xavier Mertens(Ab)Using Security Tools & Controls for the Bad
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2020-07-21/a>Jan KoprivaCouple of interesting Covid-19 related stats
2020-03-02/a>Jan KoprivaSecure vs. cleartext protocols - couple of interesting stats
2019-03-09/a>Guy BruneauA Comparison Study of SSH Port Activity - TCP 22 & 2222
2018-11-07/a>Bojan ZdrnjaTunneling scanners (or really anything) over SSH
2018-08-20/a>Didier StevensOpenSSH user enumeration (CVE-2018-15473)
2018-01-07/a>Guy BruneauSSH Scans by Clients Types
2017-11-01/a>Rob VandenBrinkSecuring SSH Services - Go Blue Team!!
2016-03-15/a>Xavier MertensDockerized DShield SSH Honeypot
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy
2016-01-21/a>Jim ClausingScanning for Fortinet ssh backdoor
2015-06-23/a>Kevin ShorttXOR DDOS Mitigation and Analysis
2015-04-03/a>Didier StevensSSH Fingerprints Are Important
2014-07-23/a>Johannes UllrichNew Feature: "Live" SSH Brute Force Logs and New Kippo Client
2014-07-02/a>Johannes UllrichCisco Unified Communications Domain Manager Update
2014-06-11/a>Daniel WesemannGimme your keys!
2014-01-20/a>Rob VandenBrinkYou Can Run, but You Can't Hide (SSH and other open services)
2013-12-20/a>Daniel Wesemannauthorized key lime pie
2013-12-02/a>Richard PorterReports of higher than normal SSH Attacks
2013-11-11/a>Johannes UllrichOpenSSH Vulnerability
2013-10-10/a>Mark HofmanCSAM Some more unusual scans
2013-06-23/a>Kevin ListonIs SSH no more secure than telnet?
2013-02-21/a>Bojan ZdrnjaSSHD rootkit in the wild
2013-01-26/a>Scott FendleyBlocking SSH to Limit Security Exposures
2012-12-27/a>John BambenekIt's 3pm 2 days after Christmas, do you know where your unmanaged SSH keys are?
2012-12-16/a>Tony CarothersSSH Brute Force on Non-Standard Ports
2012-12-03/a>Kevin ListonRecent SSH vulnerabilities
2012-06-12/a>Swa FrantzenF5 ssh configuration goof
2011-12-04/a>Guy BruneauSSH Password Brute Forcing may be on the Rise
2011-11-06/a>Tom ListonNew, odd SSH brute force behavior
2011-09-15/a>Johannes UllrichSSH Vandals?
2011-08-02/a>Mark HofmanSSH Brute Force attacks
2011-07-31/a>Daniel WesemannAnatomy of a Unix breach
2011-07-17/a>Mark HofmanSSH Brute Force
2011-03-07/a>Johannes UllrichOutbound SSH Traffic from HP Virtual Connect Blades
2011-02-05/a>Guy BruneauOpenSSH Legacy Certificate Information Disclosure Vulnerability
2010-09-07/a>Bojan ZdrnjaSSH password authentication insight and analysis by DRG
2010-08-10/a>Daniel WesemannProtect your privates!
2010-08-10/a>Daniel WesemannSSH - new brute force tool?
2010-06-18/a>Adrien de BeaupreDistributed SSH Brute Force Attempts on the rise again
2010-06-18/a>Tom ListonIMPORTANT INFORMATION: Distributed SSH Brute Force Attacks
2010-01-18/a>Stephen HallUplift in SSH brute forcing attacks
2010-01-01/a>G. N. WhiteDealing With Unwanted SSH Bruteforcing
2009-10-17/a>Rick WannerCyber Security Awareness Month - Day 17 - Port 22/SSH
2009-10-02/a>Stephen HallNew version of OpenSSH released
2009-07-09/a>Bojan ZdrnjaOpenSSH 0day FUD
2009-07-07/a>Marcus SachsOpenSSH Rumors
2009-04-17/a>Daniel WesemannGuess what? SSH again!
2009-04-07/a>Johannes UllrichSSH scanning from compromised mail servers
2009-03-30/a>Daniel WesemannWatch your Internet routers!
2008-10-02/a>Kyle HaugsnessLow, slow, distributed SSH username brute forcing
2008-08-26/a>John BambenekActive attacks using stolen SSH keys (UPDATED)
2008-06-09/a>Scott FendleySo Where Are Those OpenSSH Key-based Attacks?
2008-05-16/a>Daniel WesemannINFOcon back to green
2008-05-15/a>Bojan ZdrnjaDebian and Ubuntu users: fix your keys/certificates NOW
2008-05-15/a>Bojan ZdrnjaINFOCon yellow: update your Debian generated keys/certs ASAP
2008-05-13/a>Swa FrantzenOpenSSH: Predictable PRNG in debian and ubuntu Linux
2008-05-12/a>Scott FendleyBrute-force SSH Attacks on the Rise
2006-10-03/a>Swa FrantzenDetecting attacks against servers

PROXY

2022-10-07/a>Xavier MertensCritical Fortinet Vulnerability Ahead
2021-10-14/a>Xavier MertensPort-Forwarding with Windows for the Win
2021-09-15/a>Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2021-08-09/a>Jan KoprivaProxyShell - how many Exchange servers are affected and where are they?
2021-04-16/a>Xavier MertensHTTPS Support for All Internal Services
2017-04-02/a>Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-03-08/a>Richard PorterWhat is really being proxied?
2016-08-24/a>Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy
2014-02-24/a>Russ McReeExplicit Trusted Proxy in HTTP/2.0 or...not so much
2012-12-06/a>Johannes UllrichHow to identify if you are behind a "Transparent Proxy"
2011-08-14/a>Guy BruneauTelex - A Radical New Approach to Bypass Security
2009-03-10/a>Swa FrantzenBrowser plug-ins, transparent proxies and same origin policies

HONEYPOT

2024-09-13/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 2
2024-09-06/a>Jesse La GrewEnrichment Data: Keeping it Fresh
2024-08-16/a>Jesse La Grew[Guest Diary] 7 minutes and 4 steps to a quick win: A write-up on custom tools
2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-25/a>Jesse La GrewDoes it matter if iptables isn't running on my honeypot?
2024-03-10/a>Guy BruneauWhat happens when you accidentally leak your AWS API keys? [Guest Diary]
2024-03-07/a>Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2024-03-03/a>Guy BruneauCapturing DShield Packets with a LAN Tap [Guest Diary]
2024-02-25/a>Guy BruneauUtilizing the VirusTotal API to Query Files Uploaded to DShield Honeypot [Guest Diary]
2024-02-18/a>Guy BruneauMirai-Mirai On The Wall... [Guest Diary]
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-30/a>Johannes UllrichWhat did I say to make you stop talking to me?
2024-01-17/a>Jesse La GrewNumber Usage in Passwords
2023-12-27/a>Guy BruneauUnveiling the Mirai: Insights into Recent DShield Honeypot Activity [Guest Diary]
2023-12-13/a>Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-11-30/a>John BambenekProphetic Post by Intern on CVE-2023-1389 Foreshadows Mirai Botnet Expansion Today
2023-11-27/a>Guy BruneauDecoding the Patterns: Analyzing DShield Honeypot Activity [Guest Diary]
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-10-15/a>Guy BruneauDomain Name Used as Password Captured by DShield Sensor
2023-09-14/a>Jesse La GrewDShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
2023-09-09/a>Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-09-05/a>Jesse La GrewCommon usernames submitted to honeypots
2023-09-02/a>Jesse La GrewWhat is the origin of passwords submitted to honeypots?
2023-08-31/a>Guy BruneauPotential Weaponizing of Honeypot Logs [Guest Diary]
2023-08-12/a>Guy BruneauDShield Sensor Monitoring with a Docker ELK Stack [Guest Diary]
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2023-07-06/a>Jesse La GrewIDS Comparisons with DShield Honeypot Data
2023-06-11/a>Guy BruneauDShield Honeypot Activity for May 2023
2023-05-14/a>Guy BruneauDShield Sensor Update
2023-04-17/a>Jan KoprivaThe strange case of Great honeypot of China
2023-01-31/a>Jesse La GrewDShield Honeypot Setup with pfSense
2022-12-29/a>Jesse La GrewOpening the Door for a Knock: Creating a Custom DShield Listener
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-09-12/a>Johannes UllrichVirusTotal Result Comparisons for Honeypot Malware
2022-08-18/a>Johannes UllrichHoneypot Attack Summaries with Python
2022-06-15/a>Johannes UllrichTerraforming Honeypots. Installing DShield Sensors in the Cloud
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2021-01-15/a>Guy BruneauObfuscated DNS Queries
2020-12-04/a>Guy BruneauDetecting Actors Activity with Threat Intel
2020-07-01/a>Jim ClausingSetting up the Dshield honeypot and tcp-honeypot.py
2020-06-28/a>Guy Bruneautcp-honeypot.py Logstash Parser & Dashboard Update
2020-06-25/a>Johannes UllrichTech Tuesday Recap / Recordings: Part 2 (Installing the Honeypot) release.
2020-06-20/a>Tom WebbPi Zero HoneyPot
2020-06-05/a>Remco VerhoefNot so FastCGI!
2020-05-01/a>Jim ClausingAttack traffic on TCP port 9673
2020-01-12/a>Guy BruneauELK Dashboard and Logstash parser for tcp-honeypot Logs
2019-11-03/a>Didier StevensYou Too? "Unusual Activity with Double Base64 Encoding"
2018-11-09/a>Tom WebbPlaying with T-POT
2018-05-27/a>Guy BruneauCapture and Analysis of User Agents
2017-08-03/a>Johannes UllrichUsing a Raspberry Pi honeypot to contribute data to DShield/ISC
2017-07-27/a>Xavier MertensTinyPot, My Small Honeypot
2017-03-12/a>Guy BruneauHoneypot Logs and Tracking a VBE Script
2017-02-21/a>Jim ClausingQuick and dirty generic listener
2016-12-31/a>Xavier MertensOngoing Scans Below the Radar
2016-11-13/a>Guy BruneauBitcoin Miner File Upload via FTP
2016-07-07/a>Johannes UllrichPatchwork: Is it still "Advanced" if all you have to do is Copy/Paste?
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-05-14/a>Guy BruneauINetSim as a Basic Honeypot
2016-04-27/a>Tom WebbKippos Cousin Cowrie
2016-03-15/a>Xavier MertensDockerized DShield SSH Honeypot
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy
2015-04-14/a>Johannes UllrichOdd POST Request To Web Honeypot
2014-07-31/a>Chris MohanA Honeypot for home: Raspberry Pi
2014-06-30/a>Johannes UllrichShould I setup a Honeypot? [SANSFIRE]
2014-05-01/a>Johannes UllrichBusybox Honeypot Fingerprinting and a new DVR scanner
2013-07-25/a>Johannes UllrichA Couple of SSH Brute Force Compromises
2013-07-13/a>Lenny ZeltserDecoy Personas for Safeguarding Online Identity Using Deception
2010-11-05/a>Adrien de BeaupreBot honeypot
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-09-18/a>Jason LamResults from Webhoneypot project
2009-06-11/a>Jason LamDshield Web Honeypot going beta
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-02-17/a>Jason LamDShield Web Honeypot - Alpha Preview Release
2008-12-01/a>Jason LamCall for volunteers - Web Honeypot Project

COWRIE

2024-10-03/a>Guy BruneauKickstart Your DShield Honeypot [Guest Diary]
2024-08-27/a>Guy BruneauVega-Lite with Kibana to Parse and Display IP Activity over Time
2024-02-03/a>Guy BruneauDShield Sensor Log Collection with Elasticsearch
2024-01-30/a>Johannes UllrichWhat did I say to make you stop talking to me?
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-24/a>Jesse La GrewMore Data Enrichment for Cowrie Logs
2022-05-03/a>Johannes UllrichSome Honeypot Updates
2020-04-02/a>Tom WebbTPOT's Cowrie to ISC Logs
2016-03-13/a>Xavier MertensSSH Honeypots (Ab)used as Proxy