Description: The number of client-side attacks has grown significantly in the past few years shifting focus on poorly protected vulnerable clients. Just as the most known honeypot technologies enable research into server-side attacks, honeyclients allow the study of client-side attacks. A complement to honeypots, a honeyclient is a tool designed to mimic the behavior of a user-driven network client application, such as a web browser, and be exploited by an attacker’s content. The talk will describe the theoretical and practical steps required to design and realize a low-interaction honeyclient. During the talk, a new Honeynet Project low-interaction honeyclient (project name "Thug") aimed at mimicing the behavior of a web browser, will be publicly presented and released.
Speaker Bio:
Angelo Dell'Aera is currently employed at Security Reply, a security service provider located in Italy, working in the Early Warning Team as Senior Threat Analyst. Moreover he leads Sysenter Honeynet Project Chapter and his interests are mainly related to botnet tracking, honeyclient technologies and malware analysis. Angelo started working as an independent researcher in networking and security research in 1998 focusing his research both on attack and defense techniques mainly focusing on *NIX platforms. Meanwhile he worked as researcher in Politecnico of Bari until June 2004 where his main research argument was TCP congestion control algorithms. His research led to the design of the TCP Westwood+ algorithm and the implementation of its support in the official Linux kernel.
Tags: securitytube , honeynet , hacking , hackers , workshop , information security , convention , computer security , honeynet 12 , honeynet-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.