lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
From: rmcgeeha at students.depaul.edu (Ryan McGeehan)
Subject: Google Hack Honeypot v1.0 is released!

Google Hack Honeypot v1.0 is released!

The Google Hack Honeypot (GHH) is a reaction to a new type of malicious 
web traffic: search engine hackers. GHH is designed to provide 
reconaissance against attackers that use search engines as a hacking 
tool against your resources. GHH implements honeypot theory to provide 
additional security to your web presence.  Coded in PHP and released 
under the GNU General Public License - GHH is Free Open Source Software.

http://ghh.sourceforge.net/news.htm

Google has developed a powerful tool. The search engine that Google has 
implemented allows for searching on an immense amount of information. 
The Google index has swelled past 8 billion pages [February 2005] and 
continues to grow daily. Mirroring the growth of the Google index, the 
spread of web-based applications such as message boards and remote 
administrative tools has resulted in an increase in the number of 
misconfigured and vulnerable web apps available on the Internet.

GHH User Manual, including FAQ and installation guide: 
http://ghh.sourceforge.net/GHH_User_Manual.pdf

Visit the project homepage: http://ghh.sourceforge.net

These insecure tools, when combined with the power of a search engine 
and index which Google provides, results in a convenient attack vector 
for malicious users. It is in your best interest to be knowledgable of, 
and protect yourself from this threat.

The Google Hack phenomenon has caught the attention of a broad 
audience.  While there are many practical uses for Google Hacks, there 
are also devious and possibly harmful uses of the same technology. An 
emerging community of malicous Google Hackers has formed up and a 
response has become necessary.  GHH allows administrators to track 
malicious hosts: observe who is perpetrating the attack and how it is 
being executed via log file. The data generated by this, or any other 
honeypot can be used to deny future access to attackers, notify service 
providers of attacks originating from their networks or act as an input 
for statistical analysis.

- The GHH Team
- Visit the project homepage at http://ghh.sourceforge.net

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ