YoVDO

Uncovering Honeypot's Flawed Logic for Counter-Intelligence

Offered By: Ekoparty Security Conference via YouTube

Tags

Honeypots Courses Cybersecurity Courses Network Security Courses Threat Intelligence Courses Vulnerability Assessment Courses Network Scanning Courses Packet Analysis Courses Security Research Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of honeypot vulnerabilities and counter-intelligence techniques in this 48-minute conference talk from Ekoparty Security Conference. Delve into novel methods for identifying honeypots by exploiting flawed logic in their packet-handling functions, even when highly customized. Learn about the research conducted on approximately 40 honeypots, revealing widespread issues and their implications for threat intelligence. Discover the results of a large-scale scan analysis used to detect honeypots globally and uncover the entities behind them. Gain insights from cybersecurity specialist Sheila Berta as she shares interesting statistics and curious cases of unexpected honeypot operators. Understand the potential risks and limitations of popular open-source honeypot solutions, and consider the implications for network security and threat intelligence strategies.

Syllabus

Oh no, Winnie that’s not honey!–Uncovering Honeypot’s Flawed Logic for Counter-Intelligence -S Berta


Taught by

Ekoparty Security Conference

Related Courses

Assembly Language Adventures (1): Counting with two digits
Udemy
Assembly Language Adventures: Complete Course
Udemy
OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
Cybrary
Analyzing Wi-Fi Wardriving Data with Google Colab
SecurityFWD via YouTube
Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube