Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
2018-10-17-08-44-05-192.168.100.109.capinfos | 2021-03-06 22:29 | 1.1K | ||
2018-10-17-08-44-05-192.168.100.109.dnstop | 2021-03-06 22:27 | 2.9K | ||
2018-10-17-08-44-05-192.168.100.109.passivedns | 2021-03-06 22:27 | 4.6K | ||
2018-10-17-08-44-05-192.168.100.109.pcap | 2021-03-06 22:27 | 7.2M | ||
README.html | 2021-03-06 22:29 | 4.5K | ||
README.json | 2022-03-27 13:52 | 15K | ||
README.md | 2021-03-06 22:29 | 3.3K | ||
bro/ | 2021-03-06 22:27 | - | ||
suricata/ | 2022-01-30 12:27 | - | ||
- Infected device: 192.168.100.109
- Default GW: 192.168.100.1
The port redirection was not working for the last couple of days. The rule was applied again, and now the port redirection works well, just remember the limited bandwidth.
Sniffing computer went off due to maintenance.
Sniffing computer is back on.
Capturing traffic is working again.
Electricity outage at the building.
Electricity is back on, capturing started again.
Reboot of the sniffing computer.
Reboot of the sniffing computer.
Camera disconnected.
Camera connected again.
Camera maintenance from IP 147.32.217.200
Electricity outage at the university building.
Configuration of the lab infrastructure.
These files were generated in the Stratosphere Laboratory as part of the Aposemat Project for collecting IoT malware captures Done in the CVUT University, Prague, Czech Republic. The goal is to store long-lived real iot malware traffic and to generate labeled netflows files. Any question feel free to contact us at: Sebastian Garcia: sebastian.garcia@agents.fel.cvut.cz
You need authorization from the Stratosphere Lab to use these files.