Folks,

Capture-HPC 2.1 uses a divide-and-conquer algorithm to interact with
multiple web pages repeatedly to determine which one is actually the
malicious one. Because of anti-forensic techniques used by malicious web
pages, such as IP tracking and fast-flux networks, it is crucial to interact
with the identical web pages. The way I am accomplishing this is to have the
client honeypot connect to the potentially malicious web servers through a
proxy. This is not only a required setup to have the divide-and-conquer
algorithm work, but also it assists in analyzing the page after it has been
identified using the vulnerable and/or non-vulnerable client. I have added a
blog post in which I describe how I configure the cache to accomplish this:
http://www.mcs.vuw.ac.nz/~cseifert/blog/pivot/entry.php?id=68#body

Christian

-- 
----
Web: http://www.mcs.vuw.ac.nz/~cseifert

PGP key
http://www.mcs.vuw.ac.nz/~cseifert/pgpkey.txt
Primary key fingerprint: E979 0D9A 9187 D821 F86F B712 C8DB 0583 B046 BAEF
_______________________________________________
Capture-HPC mailing list
Capture-HPC@public.honeynet.org
https://public.honeynet.org/mailman/listinfo/capture-hpc

Reply via email to