Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all! We have been experiencing an issue on site where threads have been missing the latest postings. The platform host Vanilla are working on this issue. A workaround that has been used by some is to navigate back from 1 to 10+ pages to re-sync the thread and this will then show the latest posts. Thanks, Mike.
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Reverse Honeynet Project

  • 07-05-2002 10:47am
    #1
    Registered Users, Registered Users 2 Posts: 6,265 ✭✭✭


    yoiinked from an email and byte.com
    You've probably heard of the Honeynet Project, the nonprofit security
    research group that sets up decoy networks in order to study the methods
    and tools of hackers in the wild. In its Phase I operation, which lasted
    from 1999-2000, the Honeynet Project gathered enough information to fuel
    a series of "Know Your Enemy" papers, and later a book of the same name.
    Now into Phase II of their project, the Honeynet operators are focusing
    both on improving the honeynets and on analyzing their existing data.
    The project sponsored a fascinating forensic challenge a year ago, in
    which an image reproduction of a compromised Linux server was released
    on the Internet, and entrants were challenged to determine as much as
    possible about the intruder's identity and methods. The 13 analyses
    submitted clearly demonstrate just how much time and effort it takes to
    understand an intrusion -- and how helpful multiple viewpoints into the
    data can be. Almost all of the investigators each caught some detail
    that the others had missed.
    Now the Honeynet Project has announced a new contest: The Reverse
    Challenge ( http://project.honeynet.org/reverse/ ). A binary described
    only as "a unique tool captured in the wild" has been posted on the
    project website, and security enthusiasts are given a month to reverse
    engineer the malicious code; identify as much as they can about how it
    works, what it does, and how it can be stopped; and draw conclusions
    about the tool's author and possible future threats. Prizes include
    copies of Know Your Enemy as well as licensed versions of the reverse-
    engineering tool IDA Pro, a free pass to Black Hat Briefings, and a $200
    gift certificate to Amazon.
    The Honeynet Project, and those who take the time to contribute their
    efforts in these challenges, represents the best of the security
    community. Practical analysis and the free exchange of research leads to
    better and safer software. In these kinds of contests, everybody's a winner.
    Shannon Cochran Associate Editor scochran@byte.com


Comments

  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    Has anyone here reversed and analysed the binary yet?


Advertisement