alxbob
alxbob
https://github.com/Ayms/node-Tor https://pypi.python.org/pypi/pyp2p
Full tor support and hidden services can work inside zeronet by creating a dht (that would be a tor hidden service it self) that holds the .onion addresses and load...
So how malheur knows something is malicious and something is not? Shouldn't i tag it somehow? So i auto trade malheur by feeding cuckoo with samples? Thanks again for your...
Thanks for your answer What i don't understand is that if i commit a sample with a zeroday malware or a custom metepreter that doesn't have a know signature (and...
@doomedraven Yes i have to...i asked before start reading further for some generic answers from ppl that are more informed than me! So an onliner would be helpful also some...
So the short answer is that training is automated and long answer is that zerodays should manually tagged somehow and then malheur should learn about them?
My mistake let me describe it as complete as possible: As far as i understand for live traffic capture i need 3 elk containers 1 kibana and 1 bro-xinetd so...
My nc is tcpdump -i eth1 -s 0 -w /dev/stdout | nc 10.0.0.27 1969 also tried tcpdump -i eth1 -s 0 -w - | nc 10.0.0.27 1969 docker ps -a...
Eth1 interface is a monitor interface on the host. I have access from remote server nc 10.0.0.27 1969 is open and telnet working (also tried localhost) Inside bro-xinitd tcpdump -i...
I also tried to send a simulated get request using netcat but bro container seems to read nothing :( Its like bro service isn't running root@bro-xinetd-elasticsearch:/tmp# ps -aux USER PID...