networksecuritystory asked:
By: Shamus McGovern and Saud Al Tamimi This video shows the flexibility and capability of a low interaction virtual honeypot as a network security tool. The video will first provide the viewer with some background information about honeypots. Following that is a running configuration of our honeypot, which emulates 2 routers with telnet open. We then telnet to these routers and log the attack using wireshark. Follow the attack is an explanation of how this information gathered is useful, and what actually happened during the attack.
Advertisement