networksecuritystory asked:

By: Shamus McGovern and Saud Al Tamimi This video shows the flexibility and capability of a low interaction virtual honeypot as a network security tool. The video will first provide the viewer with some background information about honeypots. Following that is a running configuration of our honeypot, which emulates 2 routers with telnet open. We then telnet to these routers and log the attack using wireshark. Follow the attack is an explanation of how this information gathered is useful, and what actually happened during the attack.

Advertisement
Tagged with →  
Share →

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for something?

Use the form below to search the site:


Still not finding what you're looking for? Drop us a note so we can take care of it!

Set your Twitter account name in your settings to use the TwitterBar Section.