Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.

Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)

published on 2024-12-26 00:14:28 UTC by
Content:
By default, DShield Honeypots [1] collect firewall, web and cowrie (telnet/ssh) [2] data and log them on the local filesystem. A subset of this data is reported to the SANS Internet Storm Center (ISC) where it can be used by anyone [3]. A common question that comes up from new users is whether there is any benefit to collecting PCAP data from the honeypots if the active services are already being logged. One example I often give of a useful benefit of having PCAPs is HTTP POST data. This data is not currently captured within the web honeypot logs, but can be seen within the PCAP data. 
Article: Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th) - published 15 days ago.

https://isc.sans.edu/diary/rss/31546   
Published: 2024 12 26 00:14:28
Received: 2024 12 26 00:52:20
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Views: 4

Custom HTML Block

Click to Open Code Editor