YoVDO

Web Application Honeypot Threat Intelligence - Techniques and Implementation

Offered By: OWASP Foundation via YouTube

Tags

Web Application Security Courses Docker Courses Threat Intelligence Courses ELK Stack Courses Web Application Firewalls Courses Honeypots Courses ModSecurity Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of web application honeypots and threat intelligence in this 31-minute OWASP Foundation talk by Adrian Winckles, Director of Cyber Security & Networking Research Group at Anglia Ruskin University. Dive into the OWASP Web Application Honeypot Project, designed to identify and report emerging attacks against web applications. Learn about the collection, storage, and analysis of threat intelligence data, and discover how honeypots can provide realistic targets to entice attackers while revealing their tools and techniques. Examine the use of ModSecurity-based Web Application Firewall technology with OWASP's Core Rule Set, and understand how intelligence data is converted to STIX/TAXII format or visualized using ELK. Gain insights into the project's goals of creating globally distributed honeypots, aggregating attack techniques, and developing educational information for application writers. Explore the rich dataset available for post-attack forensics and incident response, and delve into topics such as WAF implementation, Mod Security, proof of concept layouts, and future project stages.

Syllabus

Intro
Why OWASP Web Honeypots (Part 2)?
Consider the WAF - Web Application Firewall
The WAF as a Honeypot or Probe?
Mod Security - An Open Source Web Application Firewall
Original Project
Proof of Concept Layout (in Docker format)
Honey Traps
Proposed Next Stages


Taught by

OWASP Foundation

Related Courses

Authentication & Authorization: OAuth
Udacity
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Hacking and Patching
University of Colorado System via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera