Jesse La Grew Diaries
- DShield and qemu Sitting in a Tree: L-O-G-G-I-N-G
- Common usernames submitted to honeypots
- What is the origin of passwords submitted to honeypots?
- Command Line Parsing - Are These Really Unique Strings?
- DShield Honeypot Maintenance and Data Retention
- IDS Comparisons with DShield Honeypot Data
- More Data Enrichment for Cowrie Logs
- Signals Defense With Faraday Bags & Flipper Zero
- Exploration of DShield Cowrie Data with jq
- Network Data Collector Placement Makes a Difference
- PCAP Data Analysis with Zeek
- Rotating Packet Captures with pfSense
- DShield Honeypot Setup with pfSense
- Opening the Door for a Knock: Creating a Custom DShield Listener
- Extracting 'HTTP CONNECT' Requests with Python