+ All Categories
Home > Documents > Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons...

Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons...

Date post: 20-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
32
The Honeynet Project is a non-profit, all volunteer security research organization dedicated to researching the blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around the world to capture and analzye blackhat activity. These lessons are then shared with the security community. The Honeynet Project began in 1999 and continues to grow with the founding of the Honeynet Research Alliance. You can learn more about the Project at http://project.honeynet.org Phase II - 2nd Generation Honeynet Technologies Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The Honeynet Project has made extensive advances in Honeynet technologies, what we call GenII systems. These technologies are easier to deploy, harder to detect, and capturegreater levels of information. The Project will discuss in detail how these technologies work, examples of deployments, and our findings. We will also discuss the Honeynet Research Alliance, an organization of Honeynets distributed around the world. We will also be covering the Reverse Challenge and the binary in question. We will conclude our presentation with a discussion panel. You will have the chance to ask Honeynet members question about Honeynets, how they work, their value, their findings, and the blackhat community in general. The Honeynet Project black hat briefings
Transcript
Page 1: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

The Honeynet Project is a non-profit, all volunteer securityresearch organization dedicated to researching theblackhat community, and sharing the lessons learned. Madeup of thirty security professional, the Project deploysHoneynet around the world to capture and analzyeblackhat activity. These lessons are then shared with thesecurity community. The Honeynet Project began in 1999and continues to grow with the founding of the HoneynetResearch Alliance. You can learn more about the Project athttp://project.honeynet.org

Phase II - 2nd Generation HoneynetTechnologies

Honeynets are a sophisticated type of honeypot used to gather

information on the enemy. The Honeynet Project has made

extensive advances in Honeynet technologies, what we call GenII

systems. These technologies are easier to deploy, harder to detect,

and capturegreater levels of information. The Project will discuss

in detail how these technologies work, examples of deployments,

and our findings. We will also discuss the Honeynet Research

Alliance, an organization of Honeynets distributed around the

world.

We will also be covering the Reverse Challenge and the binary

in question.

We will conclude our presentation with a discussion panel.

You will have the chance to ask Honeynet members question

about Honeynets, how they work, their value, their findings, and

the blackhat community in general.

The Honeynet Project b

la

ck

ha

tb

rie

fin

gs

Page 2: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around
Page 3: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 4: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 5: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 6: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 7: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 8: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 9: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 10: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 11: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 12: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 13: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 14: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 15: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 16: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 17: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 18: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 19: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 20: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 21: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 22: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 23: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 24: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 25: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 26: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 27: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 28: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 29: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 30: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 31: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

bla

ck

ha

tb

rie

fin

gs

digital self defense

Page 32: Phase II - 2nd Generation Honeynet Technologies · blackhat community, and sharing the lessons learned. Made up of thirty security professional, the Project deploys Honeynet around

Recommended