Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Subject: Interesting research paper
From: Alfred Huger (ahSECURITYFOCUS.COM)
Date: Sun Jun 25 2000 - 19:44:53 CDT
- Next message: Toby Miller: "wu-ftp analysis"
- Previous message: Ryan Hilton: "Re: Looking for papers about Buffer overflow"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
A pretty unconventional research paper was recently released which may be
worth a read as I do not believe I have ever seen research of this type
made public before.
The paper focuses on an examination of black-hat activity following the
compromise of a honeynet setup. This paper is the result of the work and
research of the Honeynet Project, a small group of security professionals
dedicated to learning the tools and tactics of the blackhat community. In
it, the reader is shown detailed keystroke logs of everything that these
unsuspecting blackhats did to hack and maintain root on the system, as
well as full transcripts of their IRC sessions while they were being
watched - including:
1. Their plans to DoS major networks
2. Usage of stolen credit card numbers
3. The Honeynet Project estimates that over 370 other systems were
compromised in this two-week period by the same individuals.
This research is located at: