Главная
Study mode:
on
1
Intro
2
Traditional Defensive Concepts
3
Theres Always a Way
4
Its Not Just APTs
5
What is Active Defense
6
Security Engineering
7
Use Cases
8
Honey Dr3
9
ADHD
10
Warning banners
11
Honeypot types
12
Linux example
13
PowerShell example
14
Artillery Supply
15
Artillery Logs
16
File Integrity Monitoring
17
Publicfacing Honeypots
18
Wordpot
19
PHPMyAdmin
20
Fake Application
21
Honey Badger
22
Example
23
Medium Interaction
24
Capo
25
Kippo
26
Github
27
Tools
28
Router Manhunter
29
Warnings
30
Audio Issues
31
Windows Box
32
Wire Transfer
33
Zip Bombs
34
NetCat
35
Monitoring
36
Security Tools
37
Thread Intelligence
38
Event Correlation
39
Dynamic Honeypots
40
Rapid Response Tools
41
PowerShell Recon
42
ippograph
43
Modern Honey Network
44
Data Collection
45
Top User Names
46
File Access
47
User Agent Strings
48
payloads
49
directionality
50
dashboard
51
recommended reading
52
questions
Description:
Explore active defense strategies and honeypot techniques in this comprehensive conference talk from Derbycon 2015. Delve into traditional defensive concepts, security engineering, and various use cases for honeypots. Learn about different honeypot types, including Linux and PowerShell examples, as well as public-facing options like Wordpot and PHPMyAdmin. Discover medium-interaction tools such as Capo and Kippo, and explore advanced techniques like router manhunting and wire transfers. Gain insights into monitoring, security tools, threat intelligence, and event correlation. Examine dynamic honeypots, rapid response tools, and the Modern Honey Network. Analyze data collection methods, including top user names, file access, and user agent strings. Conclude with recommended reading and a Q&A session to enhance your understanding of active defense and honeypot implementation.

Honeypots for Active Defense

Add to list