Dionaea - Setting up a Honeypot environment (Part 2)

1. Introduction In the previous post, we configured an SSH honeypot using Cowrie. In this tutorial, I will go through the installation and configuration process for a honeypot application named Dionaea. While Cowrie is a Honeypot designed to record traffic related to SSH and Telnet, Dionaea focuses on capturing malware. Dionaea does this by emulating…

Cowrie - Setting up a Honeypot environment (Part 1)

1. Introduction A Honeypots function could be considered consistent with its name, it is designed to attract malicious traffic, it does this by emulating services that would be considered valuable for malicious attackers. When a bad actor tries to establish a connection with the service running on the honeypot, the connection will be logged and made available for…

Install and configure ClamAV on Ubuntu

Objective Install and configure ClamAV to scan for viruses on a local machine Distributions The distribution in this walkthrough will be based on Ubuntu 16.04, there shouldn't however be any issues with new distributions. Introductions Compared to an operating system like Windows, malicious software isn't all that common - they do however exist. Very often,…

Wireless hacking – WPA/WPA2 – Social engineering (Part 4)

The insufficiency of brute-force In more realistic circumstances, a WPA network would not be as easy (as the previous example seemed to suggest) to penetrate. Everything comes down to the strength of the password, and these passwords are often very hard to crack. This is especially true if the routers/access-points are pre-configured by the manufacturer…

Wireless hacking – WPA/WPA2 - Brute force (Part 3)

  As mentioned above, the WPA/WPA2 standard was meant to fix some of the vulnerabilities found in the WEP standard; this also included the attack performed previously in this report. There are some flaws found in the current WPA/WPA2, but there is currently no logical or statistical way that can be used to make the…

Wireless hacking - introduction (Part 1)

With the radical increase of mobile devices, computers and the exponentially increasing amount of IoT devices we have seen in the last decade, wireless ethnology has become an essential part of the way we communicate with the world. It clearly wouldn’t be very practical to have a Ethernet cable connected to every device at home…