Websense, Inc. has posted their presentation from the rsa conf 2008 online
(with narrative and some video clips). Maybe of interest to some of you...

Quite interesting insight into their infrastructure and the latest client
honeypot technology they work on:
- spiffy - instrumented browser that simulates the DOM. spiffy is able to
detect certain conditions, like additions of iframes that then can be
analyzed.
- XMON - generic shellcode detection in which the memory is monitored for
shellcode (done via hooking the browser)
- binary downloader... here binaries are downloaded, executed and new http
connections are monitored; those are fed into a high interaction client
honeypot for further analysis (this works as a lot of malware are
downloaders that make a second requests that can be plugged off)

...the presentation is located a
http://securitylabs.websense.com/images/alerts/rsa_2008_honeyclient_preso.mov.


Christian


-- 
----
Web: http://www.mcs.vuw.ac.nz/~cseifert

PGP key
http://www.mcs.vuw.ac.nz/~cseifert/pgpkey.txt
Primary key fingerprint: E979 0D9A 9187 D821 F86F B712 C8DB 0583 B046 BAEF
_______________________________________________
Capture-HPC mailing list
Capture-HPC@public.honeynet.org
https://public.honeynet.org/mailman/listinfo/capture-hpc

Reply via email to