lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 7 May 2007 18:49:09 -0400 (EDT)
From: announcements@...appsec.org
To: bugtraq@...urityfocus.com
Subject: WASC Announcement: Distributed Open Proxy Honeypot Project Data Released

The Web Application Security Consortium (WASC) is pleased to announce the
inital release of data collected by the Distributed Open Proxy
Honeypot Project.  This first release of information is for data gathered
from January - April, 2007.  During this timeframe, we had 7 internationally
placed honeypot sensors deployed and sending their data back to our central
logging host.

What did we see?  Here are some brief highlights -

   - SQL Injection Attacks
   - Brute Force Attacks
   - OS Command Injection
   - Web Defacement Attempts
   - Google-Abuses (Google-Hacking and Proxying for BannerAd/Click Fraud)
   - Information Leakage

We have created a PDF document here -
http://www.webappsec.org/projects/honeypots/Threat_Report_05072007.pdf
.  The attacks are mapped to the WASC Threat Classification categories.
There are some high-level statistics shown, however they are very crude as
this was not the focus of this phase of the project.  We understand that the
data presented is a bit raw, however we wanted to release this information
so that the public may have a chance to review it and provide feedback.  Our
initial goal was to identify the types of current attacks that are using
open proxy servers.  In our future deployments, we will attempt to refine
the data analysis processes to extract out trend data and high level
concepts. In the near future, we will be updating both the VMware honeypot
sensors themselves and will also use a newer version of the centralize
logging host (ModSecurity Console).

We are also planning to release more frequent information in the form of
diary entries on the project webpage as new attacks/trends are identified.

While the initial deployment was a success, we still need participants who
are willing to participate by deploying our VMware honeypot sensor on their
network.  If you are interested in participating, please send an email to
Ryan Barnett at - RCBarnett_@...ail.com.

URL:
http://www.webappsec.org/projects/honeypots/

Regards,

-- 
Ryan C. Barnett
Web Application Security Consortium (WASC) Member
Distributed Open Proxy Honeypot Project Lead

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ