By: Shamus McGovern and Saud Al Tamimi This video shows the flexibility and capability of a low interaction virtual honeypot as a network security tool. The video will first provide the viewer with some background information about honeypots. Following that is a running configuration of our honeypot, which emulates 2 routers with telnet open. We then telnet to these routers and log the attack using wireshark. Follow the attack is an explanation of how this information gathered is useful, and what actually happened during the attack.
Subscribe to our NewsletterLoading...
Tag CloudAnti Virus Protection Backtrack Blackhat Blog Botnet Cisco Cloud Security Cracking Cyber Security cyber security conference Data Security Educational Purposes Exploit Free Anti Virus Google Hack Hacking Hard Drive Recovery Honey Pot Honeypot Internet Security Lessons Learned Linux Mainstream Malware Management Tools Metasploit Mitm Network Security Nmap Passwords Penetration Penetration Testing Remote Exploit Security Test Speakers Ssl Steganography Symantec Testing Tool Voip Testing Vulnerabilities Wireshark Zero Day Zeus