Bd
B.A.P. de Jonge
2 records found
1
MD-Honeypot-SSH
Gathering Threat Intelligence Data during the SSH Handshake
With the amount of network connected devices every increasing, and many of them running the Secure Shell (SSH) protocol to facilitate remote management, research into SSH attacks is more important than ever. SSH honeypots can be used to act like vulnerable systems while gathering
...
In this report, we present our work on improving the administration software and automating parts of the customer service work for Plugify (https://www.plugify.nl), a young Dutch startup that provides an online music act booking platform. We first analyze Plugify's needs, and the
...