The New Zealand HoneyNet Project
honey project
creative commons
RSS Feed 2.0

NZ-Honeynet Project News

New Paper Released: KYE - Behind the Scenes of Malicious Web Servers - 07-11-2007 12:19
We are excited to announce the release of a new paper of our Know Your Enemy series, KYE: Behind the Scenes of Malicious Web Servers. In this paper, we increase our understanding of malicious web servers through analysis of several web exploitation kits that have appeared in 2006/07: WebAttacker, MPack, and IcePack. Our discoveries will necessitate adjustments on how we think about malicious web servers and will have direct implications on client honeypot technology and future studies.

Support mailing list for Capture-BAT is now available - 21-09-2007 11:29
We have setup a public mailing list for Capture-BAT. It allows you to discuss issues around installation & operation, request support, voice feature requests, share your findings, etc. You can access more information about the list at

New Client Honeynet Project Chapter - 09-09-2007 14:31
In order to consolidate our research on client honeypots on a global level, we have established a new chapter within the Honeynet Project that is dedicated to research on client honeypots, client-side attacks, and malicious servers: The Client Honeynet Project. All the work of the NZ Honeynet Project has moved to the new site. Expect a lot of new exciting things to come out from this new project ...

Release of Capture BAT 2.0 - 02-09-2007 20:58
The New Zealand Honeynet Project and Victoria University of Wellington are excited to announce the release of a new version of our behavioral analysis tool Capture BAT: version 2.0. There are many new exciting features in this release. The tool and the source code are available from It is distributed under the GNU General Public License v2.

Announcing new KYE paper: Malicious Web Servers - 13-08-2007 14:20
The Honeynet Project & Research Alliance are excited to announce the release of a new paper in our Know Your Enemy series, "KYE: Malicious Web Servers". In this paper, we take an in-depth look at malicious web servers that attack web browsers, and we evaluate several defensive strategies that can be employed to counter this threat of clients-side attacks. All the malicious web servers identified in this study were found with our client honeypoet Capture-HPC, which we make freely available from our web site at