Web Application Honeypot Threat Intelligence - Techniques and Implementation

Web Application Honeypot Threat Intelligence - Techniques and Implementation

OWASP Foundation via YouTube Direct link

Proposed Next Stages

9 of 9

9 of 9

Proposed Next Stages

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Web Application Honeypot Threat Intelligence - Techniques and Implementation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why OWASP Web Honeypots (Part 2)?
  3. 3 Consider the WAF - Web Application Firewall
  4. 4 The WAF as a Honeypot or Probe?
  5. 5 Mod Security - An Open Source Web Application Firewall
  6. 6 Original Project
  7. 7 Proof of Concept Layout (in Docker format)
  8. 8 Honey Traps
  9. 9 Proposed Next Stages

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.