Uncovering Honeypot's Flawed Logic for Counter-Intelligence
Offered By: Ekoparty Security Conference via YouTube
Course Description
Overview
Explore a comprehensive analysis of honeypot vulnerabilities and counter-intelligence techniques in this 48-minute conference talk from Ekoparty Security Conference. Delve into novel methods for identifying honeypots by exploiting flawed logic in their packet-handling functions, even when highly customized. Learn about the research conducted on approximately 40 honeypots, revealing widespread issues and their implications for threat intelligence. Discover the results of a large-scale scan analysis used to detect honeypots globally and uncover the entities behind them. Gain insights from cybersecurity specialist Sheila Berta as she shares interesting statistics and curious cases of unexpected honeypot operators. Understand the potential risks and limitations of popular open-source honeypot solutions, and consider the implications for network security and threat intelligence strategies.
Syllabus
Oh no, Winnie that’s not honey!–Uncovering Honeypot’s Flawed Logic for Counter-Intelligence -S Berta
Taught by
Ekoparty Security Conference
Related Courses
Cyberhacker Series: Honeypots, IDS and FW'sUdemy Curso de Introducción a la Seguridad Informática desde Cero!
Udemy Kali Linux Tutorial in Hindi
YouTube Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning