

{"id":4317,"date":"2023-06-08T17:07:14","date_gmt":"2023-06-08T14:07:14","guid":{"rendered":"https:\/\/csirt.lacnic.net\/?page_id=4317"},"modified":"2023-06-08T17:07:14","modified_gmt":"2023-06-08T14:07:14","slug":"lacnic-honeynet","status":"publish","type":"page","link":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet","title":{"rendered":"LACNIC Honeynet"},"content":{"rendered":"<p>Uma iniciativa do LACNIC CSIRT para identificar, em primeira m\u00e3o, os tipos mais frequentes de ataques de seguran\u00e7a na Am\u00e9rica Latina e Caribe.<br \/>\nPara isso, implementamos uma rede de honeypots de interatividade m\u00e9dia. Essa rede possibilita a visualiza\u00e7\u00e3o dos eventos de seguran\u00e7a em tempo real e a identifica\u00e7\u00e3o do modus operandi dos ataques mais comuns na regi\u00e3o, para gerar intelig\u00eancia a partir dos dados coletados e possibilitar uma atua\u00e7\u00e3o proativa na detec\u00e7\u00e3o e alerta precoce de tais amea\u00e7as. Esses dados tamb\u00e9m contribuir\u00e3o para as estat\u00edsticas p\u00fablicas do CSIRT, que mostram os diferentes tipos de ataques que envolvem recursos da regi\u00e3o e suas respectivas porcentagens.<br \/>\nEssa rede \u00e9 composta por uma s\u00e9rie de sensores distribu\u00eddos em diferentes organiza\u00e7\u00f5es com as quais buscamos estabelecer rela\u00e7\u00f5es de confian\u00e7a.<\/p>\n<h2>Sensores<\/h2>\n<p>Dispomos de alguns sensores hospedados em diferentes pa\u00edses da Am\u00e9rica Latina e Caribe. Eles s\u00e3o:<\/p>\n<div style=\"float: left; margin: 10px 0px; width: 100%;\">\n<div id=\"visualization_south\" style=\"float: left; margin: 10px 5px;\"><\/div>\n<div id=\"visualization_central\" style=\"float: left; margin: 10px 5px;\"><\/div>\n<div id=\"visualization_caribbean\" style=\"float: left; margin: 10px 5px;\"><\/div>\n<\/div>\n<p><!--h4>En proceso de instalaci\u00f3n<\/h4>\n\n\n\n\n<ol>\n \t\n\n<li>CL - 1 sensor<\/li>\n\n\n<\/ol-->\n<h2><strong>Caracter\u00edsticas dos sensores<\/strong><\/h2>\n<p>Os sensores t\u00eam requerimentos m\u00ednimos de hardware e software. Em ambos os casos, solicitamos IP dedicado (se poss\u00edvel). Pode ser escolhida uma das seguintes op\u00e7\u00f5es:<\/p>\n<p><strong>Raspberry Pi 2 ou superior<\/strong><\/p>\n<p>1 GB mem\u00f3ria RAM<br \/>\n4 GB SD<br \/>\nRaspbian Stretch Lite (2018-06-27)<\/p>\n<p><strong>Equipamento f\u00edsico\/virtual<\/strong><\/p>\n<p>1 GB mem\u00f3ria RAM<br \/>\n4 GB HDD<br \/>\nUbuntu server 18.10<\/p>\n<h2>Como fazer parte<\/h2>\n<p>Voc\u00ea pode fazer parte do projeto LACNIC Honeynet instalando um sensor na rede de sua organiza\u00e7\u00e3o. Se tiver interesse, entre em contato pelo e-mail: csirt [at] lacnic.net.<\/p>\n<p><script src=\"https:\/\/csirt.lacnic.net\/wp-content\/themes\/warp\/js\/mapa-ubicacion-honeys.js\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uma iniciativa do LACNIC CSIRT para identificar, em primeira m\u00e3o, os tipos mais frequentes de ataques de seguran\u00e7a na Am\u00e9rica Latina e Caribe. Para isso, implementamos uma rede de honeypots de interatividade m\u00e9dia. Essa rede possibilita a visualiza\u00e7\u00e3o dos eventos de seguran\u00e7a em tempo real e a identifica\u00e7\u00e3o do modus operandi dos ataques mais comuns [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4317","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC CSIRT - LACNIC Honeynet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC CSIRT - LACNIC Honeynet\" \/>\n<meta property=\"og:description\" content=\"Uma iniciativa do LACNIC CSIRT para identificar, em primeira m\u00e3o, os tipos mais frequentes de ataques de seguran\u00e7a na Am\u00e9rica Latina e Caribe. Para isso, implementamos uma rede de honeypots de interatividade m\u00e9dia. Essa rede possibilita a visualiza\u00e7\u00e3o dos eventos de seguran\u00e7a em tempo real e a identifica\u00e7\u00e3o do modus operandi dos ataques mais comuns [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC CSIRT\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic_csirt\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/lacnic-honeynet\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/lacnic-honeynet\",\"name\":\"LACNIC CSIRT - LACNIC Honeynet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\"},\"datePublished\":\"2023-06-08T14:07:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/lacnic-honeynet#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/lacnic-honeynet\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\\\/lacnic-honeynet#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csirt.lacnic.net\\\/pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LACNIC Honeynet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"name\":\"LACNIC CSIRT\",\"description\":\"Centro de Respuestas de Incidentes - LACNIC CSIRT\",\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\",\"name\":\"LACNIC CSIRT\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"width\":680,\"height\":330,\"caption\":\"LACNIC CSIRT\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/lacnic_csirt\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC CSIRT - LACNIC Honeynet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet","og_locale":"pt_BR","og_type":"article","og_title":"LACNIC CSIRT - LACNIC Honeynet","og_description":"Uma iniciativa do LACNIC CSIRT para identificar, em primeira m\u00e3o, os tipos mais frequentes de ataques de seguran\u00e7a na Am\u00e9rica Latina e Caribe. Para isso, implementamos uma rede de honeypots de interatividade m\u00e9dia. Essa rede possibilita a visualiza\u00e7\u00e3o dos eventos de seguran\u00e7a em tempo real e a identifica\u00e7\u00e3o do modus operandi dos ataques mais comuns [&hellip;]","og_url":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet","og_site_name":"LACNIC CSIRT","og_image":[{"width":680,"height":330,"url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@lacnic_csirt","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet","url":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet","name":"LACNIC CSIRT - LACNIC Honeynet","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/#website"},"datePublished":"2023-06-08T14:07:14+00:00","breadcrumb":{"@id":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csirt.lacnic.net\/pt-br\/lacnic-honeynet#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csirt.lacnic.net\/pt-br"},{"@type":"ListItem","position":2,"name":"LACNIC Honeynet"}]},{"@type":"WebSite","@id":"https:\/\/csirt.lacnic.net\/en\/#website","url":"https:\/\/csirt.lacnic.net\/en\/","name":"LACNIC CSIRT","description":"Centro de Respuestas de Incidentes - LACNIC CSIRT","publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csirt.lacnic.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/csirt.lacnic.net\/en\/#organization","name":"LACNIC CSIRT","url":"https:\/\/csirt.lacnic.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","width":680,"height":330,"caption":"LACNIC CSIRT"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/lacnic_csirt"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/pages\/4317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/comments?post=4317"}],"version-history":[{"count":0,"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/pages\/4317\/revisions"}],"wp:attachment":[{"href":"https:\/\/csirt.lacnic.net\/pt-br\/wp-json\/wp\/v2\/media?parent=4317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}