Web Honeynet Project IDs Attackers 70
narramissic writes "The Web Honeynet Project, an independent group of Honeynet researchers from Securiteam and the ITOSF, is putting a new twist on Web application honeynets by naming not only the attack details, but the IP addresses and other tracking information about the attackers as well. As security consultant Brent Huston notes, 'This approach is not unheard of, as lists of known high-volume attackers have been circulating through the Net for several years, but this is the first time someone has applied the honeynet concept to making attacker IP data publicly known.'"
Lawsuits? (Score:4, Insightful)
Re:Lawsuits? (Score:5, Informative)
For instance, I could say your post was legally incorrect; and if I'm right, then that is a fact, not defamation. If I said you're a big doo doo head for doing that.... defamation!
(making it the first declaration of defecation description defamation ever).
Re: (Score:1)
Re:Lawsuits? (Score:5, Interesting)
as far as i know you can call me a big doo doo head all you want. but what you cant say is that my post is "killing babies in 3rd world contries" (who knew my post had that kind of power?). The point is though just because the lawsuits would be baseless if the spammer really -did- spam, that isnt something that has prevented someone from suing and pretending they arent a spammer to win damages and intimidate the anti-spam community.
for more on defamation: http://en.wikipedia.org/wiki/Slander_and_libel [wikipedia.org]
In most legal systems the courts give the benefit of the doubt to the defendant. In criminal law, he or she is presumed innocent until the prosecution can prove guilt beyond a reasonable doubt; whereas in civil law, he or she is presumed innocent until the plaintiff can show liability on a balance of probabilities. However, in defamation tort, this burden of proof is reversed: the defendant has the burden to prove the truth of the defamatory communication. The plaintiff only has the burden of proving that the publisher made the statement and that the statement was defamatory, the untruth of that statement is then presumed.
Re: (Score:3, Funny)
Won't somebody think of he children!
Re: (Score:2)
If your post really d
Re: (Score:2)
If you could prove that it was true, but can't afford the legal fees, you lose anyway.
Re: (Score:2)
so not entirely backwards.
Re: (Score:1)
Re:Lawsuits? (Score:4, Insightful)
*cough* PROXY *cough*
Seriously, anyone doing something nasty on the net is using a proxy, either one from the lists, tor or another hacked machine. Publishing these IP addresses is complete rubbish. It'll point to some machine on the net along a chain of connections.
Yes ... and no. (Score:3, Informative)
If the crackers know what they're doing, the logs on the proxy are going straight to /dev/nul so they don't ever leave a trace on the hard drive.
...
BUT there is a chance that the local law enforcement can put a sniffer on that connection at the ISP level and track the connection that way.
The major problems with that is
#1. Coordinating law enforcement efforts in various countries
#2. Educat
Re: (Score:2)
Re: (Score:2, Insightful)
Re: (Score:1, Offtopic)
Re: (Score:2)
By the way, I hope they make an example out of a few of these punks. I would really like to see them let loose in a room full of the IT departments that they attacked.!
Re: (Score:2)
Me too. I picture a bunch of dorks attacking someone with underarm odour, fetid breath, and if they really want to get hardcore on his ass, their Darth Maul lightsabers.
If this can happen... (Score:5, Interesting)
Re: (Score:1)
Or Dells customer service hotline will start getting bombarded even more so than it is already!
Re:If this can happen... (Score:4, Interesting)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
You don't have to set up a full connection, and you can set a timeout for waiting for the reponding packet. (Though, if it were me, I'd probably have a cache table I'd check against first. If I receive 4000 emails from a server, I don't want to SYN flood the poor thing.)
Re: (Score:1)
Re: (Score:1, Insightful)
Re: (Score:1)
Any service provider that has users on ips without ptr records is doing a diss
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2, Insightful)
Re: (Score:3, Insightful)
Only when the consequences of allowing one's machines to be zombified is serious and high people will take security seriously.
Re: (Score:3, Insightful)
"I never could get that darn cable modem to work right after a while. So I swapped to DSL and it's fine again!"
I think you're overestimating the people this is likely to catch. Most companies are likely to have reasonable security. Most knowledgeable home users are going to have reasonable security. It's the guy that has no idea what they're doing that's going to get in troubl
Re: (Score:2)
Re:If this can happen... (Score:4, Interesting)
I'm sure it would be next to impossible to get this system up but its one idea.
Re: (Score:1)
Re: (Score:1)
All you had to do to get an IP banned, is show some honeypot logs. Maybe spoof some IPs. Too easy.
Its the same problem really with todays spam black lists. Its really hard to get off one, because the second you get into one (even via a joejob) people assume you're guilty.
Societal problem, meet technological solution, etc, etc...
Re: (Score:2)
Yeah but where? (Score:2)
This may just exacerbate the botnet issue. (Score:1)
That sounds like a dream-come-true for attackers.
Re:This may just exacerbate the botnet issue. (Score:4, Interesting)
Recently I, through curiosity, had a look at the website of the North Korean government while using a PC that had a software firewall but wasn't behind a NAT router. Literally seconds later the machine reported sustained attacks using several vectors, all originating from a range of 4 IPs located in Seoul, S.Korea.
I wonder if the democratic peoples's republic (hah!) of North Korea knows its web server is apparently being monitored...
Re: (Score:2)
Things usually
Re: (Score:2, Insightful)
While handing out fliers on Wednesday, I encountered people who were certain their computers had viruses, but hadn't planned to do anything about it.
The followup you're describing sounds like the ???? stage in the standard three-step business plan.
Re: (Score:2)
As for the 'usually three or four months'
It m
Re:Good thing. (Score:2)
Not a problem. When 50 or so botnet herders all try to use the same pasture, the overgrazing will kill it off. Problem of zombies is solved as they melt down.
Re: (Score:1)
More likely, botnet software will start incorporating anti-malware functionality targetting competing bots.
ID's the *attacker* (Score:1)
Bad idea.
Re: (Score:1)
quote is wrong (Score:1)
Project Honeypot (Score:1)
This one shows Harvester Visits to Your Site(s), email Addresses Issued on Your Site(s), Spam Received at Your Addresses, and global statistics. They also show an ip list from harversters and track it.
how effective? (Score:2)
Re: (Score:2)
Ok. I give up. Where's the list? (Score:2)
Slight copy of another existing project (Score:3, Informative)
This project is already gathering data and will be publishing the results shortly.
Know-nothing user, but I like this idea! (Score:1)
Legal Defamation Info from EFF (Score:1)
This is from the EFF [eff.org], giving good guidelines on what constitutes defamation.
Note that what makes this really tricky for the online world is that in most cases defamation is a state matter, not a Federal one, making jurisdiction a tough issue. Different states have different qualifications for defamation, one of the most relevant being whether or not the defendant knowingly made false statements about the plaintiff
My list (Score:1)
http://fu.ckers.org/fuckers.txt [ckers.org]
Legality of honeypots (Score:1)
Already being done (Score:1)