4.9 • 696 Ratings
🗓️ 14 February 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 14th, 2020-5 edition of the Sands Internet Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:13.6 | Running Honeypot is a lot of fun, but sometimes if you're trying to explain to, let's say, a family member during packet night |
0:22.8 | or maybe just for your own interest, what exactly is happening with the honeypot, |
0:28.1 | well, this can be a little bit tricky to sift through all the logs. |
0:32.0 | Guy luckily set up a seam add-on for our honeypot that provides you with some real neat dashboards |
0:40.5 | that really put some light behind the scenes and show you what exactly is happening, |
0:46.7 | what attacks the honeypot is seeing in a ratherly nice graphical representation. |
0:52.2 | This is all built around Elasticsearch, so the usual |
0:55.9 | L stack of Elasticsearch, Logs dash, Kibana is what you have in this particular setup. |
1:04.4 | A bunch of additional software seek, so some packet analysis here as well. That's all neatly |
1:09.9 | summarized. |
1:13.6 | The latest version was just released by Guy, |
1:20.7 | and he did write up a quick summary with some screenshots in his diary today. So take a look and just one little word of caution here. |
1:24.6 | Because of all the add-on software, this does not run sort of in our |
1:29.0 | minimum hardware configuration. You may need something a little bit more beefy. I've run it |
1:35.7 | sort of on essentially of one of these N-100, so these low-end Intel CPUs that actually sometimes |
1:42.6 | are competitively priced compared to, let's say, |
1:46.0 | Raspberry Pi, depending on the exact setup that you're looking for. |
1:52.4 | And then we got some Palo Alto vulnerabilities to talk about. |
1:56.6 | And this vulnerability is actually kind of interesting. |
2:00.1 | It's not sort of your very straightforward |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.