In this blog we will describe how to install h0neytr4p [1] honeypot in a cloud server instance. This blog is divided in three parts: (i) how to create a new Digital Ocean instance, (ii) how to install h0neytr4p on it, and (iii) a brief walkthrough to some of the data captured by h0neytr4p.
New Slips version 1.0.0 is here!
New Slips version 0.9.6 is here!
New Slips version 0.9.5 is here!
New Slips version 0.9.3 is here!
Slips in BlackHat US 2022 Arsenal in Las Vegas!
We are happy to announce that Slips will be presented at BlackHat USA 2022 Arsenal in Las Vegas on Thursday, August 11, from 1:00 pm to 2:30 pm: https://bit.ly/SlipsBHUSA22.
New Slips version 0.9.2 is here!
Writing a SLIPS Module
Slips is a machine learning-based intrusion prevention system for Linux and MacOS, developed at the Stratosphere Laboratories from the Czech Technical University in Prague. Slips reads network traffic flows from several sources, applies multiple detections (including machine learning detections) and detects infected computers and attackers in the network. It is easy to extend the functionality of Slips by writing a new module. This blog shows how to create a new module for Slips from scratch.
New Slips version 0.9.1 is here!
Installing Glutton Honeypot in the Cloud
In this blog we will describe how to install Glutton [1] honeypot in a cloud server instance. This blog is divided in three parts: (i) how to create a new Digital Ocean instance, (ii) how to install Glutton on it, and (iii) a walkthrough to some of the data captured by Glutton.
New Slips version 0.9.0 is here!
New Slips version 0.8.5 is here!
New Slips version 0.8.4 is here!
New Slips version 0.8.4 is here! Our team is excited to share the latest news and features of Slips, our behavioral-based machine learning intrusion detection system.
Studying the Distribution of Computational Propaganda with SerpAPI
In the Stratosphere Laboratory we set out to address this challenge of detecting if a news article is propaganda by leveraging a new idea: find which other sites are linking/referencing the news article. In this blog post, we will show how we accomplished this by using SerpApi.
Studying Cybercrime is Fun! An Overview of Five Years of Research Surrounding the Geost Botnet
New Slips version 0.8 is here!
In the last couple of months we have been busy continuing with the development of Slips, our behaviour machine learning system. And finally we published version 0.8, with crazy amount of features! You can download it from here https://github.com/stratosphereips/StratosphereLinuxIPS. And read the documentation here https://stratospherelinuxips.readthedocs.io/en/develop/.
The prevalence of DNS over HTTPS By Karel Hynek
Create and Test Your Own TAXII Server
Dissecting a RAT. Analysis of the Saefko RAT.
This is the eighth blog of a series analyzing the network traffic of Android RATs from our Android Mischief Dataset [more information here], a dataset of network traffic from Android phones infected with Remote Access Trojans (RAT). In this blog post we provide the analysis of the network traffic of the RAT06-Saefko [download here]. The previous blogs analyzed Android Tester RAT, DroidJack RAT, SpyMax RAT, AndroRAT, HawkShaw, AhMyth and Command-line AndroRAT.
Dissecting a RAT. Analysis of the Command-line AndroRAT.
This is the seventh blog of a series analyzing the network traffic of Android RATs from our Android Mischief Dataset [more information here], a dataset of network traffic from Android phones infected with Remote Access Trojans (RAT). In this blog post we provide the analysis of the network traffic of the RAT08-command-line-AndroRAT [download here]. The previous blogs analyzed Android Tester RAT, DroidJak RAT, AndroRAT RAT, SpyMax RAT, AhMyth RAT and HawkShaw RAT.