Recreating exploits – Disk Pulse Enterprise 9.9.16 – Remote Buffer Overflow (SEH)

Introduction As part of my Cracking The Perimeter course, I am doing the usual recommendation of recreating exploits from exploit-db. This post will step through the entire process of installing a target application, recreating a crash and developing an exploit. As for our target, lets recreate an exploit for Disk Pulse Enterprise 9.9.16. I’ve made …

Analyzing cowrie honeypot results

Introduction. Recently I decided to spin up a honeypot for no better reason than “because I can”. After some admittedly quick searching I found the Cowrie SSH and Telnet Honeypot. According to Cowrie’s Github Readme: Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed …