HoneyHoax - A Centralised Honeypot
Offered By: Security BSides London via YouTube
Course Description
Overview
Explore the implementation of honeyHoax, a production honeypot with research capabilities, in this 14-minute conference talk from Security BSides London. Learn about the centralized result database, configurable deployment settings, and adaptability to various environments. Discover how honeyHoax captures and displays live attacks, including origin, username, passwords, and commands used, through its web front-end. Gain insights into the deployment model, see a demonstration, and understand the reasons behind developing honeyHoax. Examine the honeyHoax dashboard and its features for effective security intelligence gathering.
Syllabus
Introduction
Overview
Deployment Model
Demo
Why honeyHoax
honeyHoax Dashboard
Taught by
Security BSides London
Related Courses
Spam Prevention TechniquesLaracasts Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning OS Analysis with Artillery
Pluralsight