Webcast: Playing in the Sandbox - Open Source Tools for Threat Intelligence

Blog Post created by ckirsch on Aug 27, 2012

Open Source Tools for Threat Intelligence WebcastIf you missed last week's webcast in the Life's a Breach series, I have good news for you: The recording is now available. In this webcast, Claudio Guarnieri, security researcher with Rapid7 and creator of Cuckoo Sandbox, shows what we can learn from analyzing malware that have been caught with honeypots.


By watching this webcast you will learn:

  • How to actively collect and analyze threats in the wild to improve security practices
  • About different kinds of honeypots, and which one to use for what
  • How to you set up a honeyclient to capture client-side attacks
  • How to use Cuckoo Sandbox for automated malware analysis


Here are some questions from the audience that were answered in the webcast:

  • Are there any honeyclients that analyze HTML5, or do they all focus on Javascript?
  • Do you typically see honeyclients and sandboxes primarily by security researchers, or also by security professionals in enterprises? How may this change in the future?
  • What's the best way to protect against client-side attacks?
  • Should enterprises use honeypots and sandboxes to defend their networks?


About the Speaker

Claudio is a Security Researcher at Rapid7. He is involved with general Internet badness on a daily basis. His specialties span from malware analysis to botnets tracking and cybercrime intelligence. Claudio is a core member of The Honeynet Project and The Shadowserver Founda tion, two no-profit organizations devoted to making Internet a safer place.


Claudio is also the creator and lead developer of Cuckoo Sandbox, a prominent open source automated malware analysis system and runs the website. He presented at several international conferences including InBot, Hack In The Box, TAIS Security Conference and the Honeynet Workshops.


View the Open Source Tools for Threat Intelligence Webcast Now