Smooth-Sec is a ready to-go IDS/IPS (Intrusion Detection/Prevention System)

It has been 6 months back when I heard about Suricata and now there is another development called Smooth-Sec to simplify the process to run this IPS/IDS.

What is Smooth-Sec?

Smooth-Sec is a ready to-go  IDS/IPS (Intrusion Detection/Prevention System) linux distribution based on the multi threaded Suricata IDS/IPS engine and Snorby, the top notch web application for network security monitoring. Smooth-Sec is built on Ubuntu 10.04 LTS using the TurnKey Core base as development platform. Functionality is the key point that allow to deploy a complete  IDS/IPS System up and running out of the box within a few minutes, even for security beginners with minimal Linux experience. Continue reading

SSH Honeypotting with Kippo

Have you ever wonder what make your SSH log file turn to really big log file, what’s inside the log files? When we look at it, we all know it would be a brute force logs from random attackers and also a small amount of it is yours – your own ssh activities.

I was a system administrator long time ago. Having this log file on your screen with tail -f executed and watching the sshd logging in with brute force attacks, its a nightmare.

But now there is something interesting for you; kippo ( .

What is kippo?

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

Kippo is inspired, but not based on Kojoney.

I have this running on my environment, its pretty interesting when you able to capture attackers activities once they went into your honeypot. As for now I have managed to collect few tools that has been use by the attackers to perform another malicious  activities.

Under maintenance


Our webhosting account has been hacked by someone known as kernal_panic. We managed to recover few datas and still working on it.

As  for now, dont forget to update your system and applications. 😉

I will post more details on this issue later, working on data recovery right now.

Thank you.

Update: As for our log analyzing result, we have confirmed the attacker came from the not updated wordpress version. We have missed to update this wordpress, 1 week after the released version. We have learned for it and took positive action on it.