Overview
Syllabus
Introduction
Welcome
Overview
Target Attackers
Underground Forums
Incidents
Vulnerabilities Incidents
Why are these environments attacked
The Government
Criminals
Nonpatched
Guardian ST
How the system works
Demonstration
Inventory Command
Critical vs NonCritical
The Honeypot
Honeypot Architecture
Honeypot Deployment
Honeypot Code
Honeypot Randomization
Honeypot Name Change
Inmap Script
Classification
Attribution
Attack Scenarios
Attack Breakdown
Connection Attempts
Valid Commands
Attack Statistics
Eddie Murphy Slide
Syrian Electronic Army
Jordanian Honey Pots
Pump Modifications
IDC
Hacking
IDC Involvement
Release
When
Preventing Attacks
Security
Logs
Was it Targeted
Taught by
Black Hat