Explore techniques for detecting, bypassing, and exploiting honeypot technologies in this Black Hat conference talk. Learn how to analyze network protocol completeness and operating system software implementation, identify vulnerabilities in honeypot code, and turn these security measures against defenders. Discover methods for mapping global honeypot deployments and leveraging them to an attacker's advantage. Examine real-world case studies of honeypot platforms in organizational networks, and gain insights into the inherent weaknesses of current honeypot implementations.
Overview
Syllabus
Breaking Honeypots For Fun And Profit
Taught by
Black Hat