Explore active defense strategies and honeypot techniques in this comprehensive conference talk from Derbycon 2015. Delve into traditional defensive concepts, security engineering, and various use cases for honeypots. Learn about different honeypot types, including Linux and PowerShell examples, as well as public-facing options like Wordpot and PHPMyAdmin. Discover medium-interaction tools such as Capo and Kippo, and explore advanced techniques like router manhunting and wire transfers. Gain insights into monitoring, security tools, threat intelligence, and event correlation. Examine dynamic honeypots, rapid response tools, and the Modern Honey Network. Analyze data collection methods, including top user names, file access, and user agent strings. Conclude with recommended reading and a Q&A session to enhance your understanding of active defense and honeypot implementation.