Skip to main content
Afterglow visual from Amun sensor

Splendid, awesome.. whatever....!



sourcefile

dotfile

csvfile

Comments

Unknown said…
What does this graph shows?
Do explain? am a bit curious...
0xff said…
the distributed IPs were source of botnet/malwares, attacking/attempt to infect the honeypot (dot 139).

DCOM and PNP were the types of vulnerabilities classified.

the vulnerabilities emulated in Amun for e.g derived from MS vuln bulletin(PNP and DCOM vuln), maybe u can check code MS05-039 and MS03-026

Popular posts from this blog

Gue dengan S2 gue. Sronok banget!
Beijing and image manipulation addict Salam, Image manipulation with command line is fun and time consuming too. Given my Digikam plugins unable to work, I start to figure out many wonderful features of other tool which offer almost the same quality. However I was stucked with ImageMagick,with many tutorial on the net: Here and Here for i in *jpg ;do convert -font helvetica -fill white -pointsize 18 -draw 'text 10,50 "ACM-ICPC Beijing 2005"' $i $i;done The pix above shows a heater to heat up guest room during ACM-ICPC competition. (outside building's temperature is almost 4 celcious).