Conference logo

Breaking Honeypots for Fun and Profit - DeanSysman, Gadi Evron, Itamar Sher

32c3 - Security - 12/30/2015

We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code.

Share this talk: