Conference logo

Breaking Honeypots for Fun and Profit - DeanSysman, Gadi Evron, Itamar Sher

32c3 - Security - 12/30/2015

We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.

Share this talk:
https://c3stream.de/Info?guid=c87fa147-d1f4-4353-82db-c3e5b646884b