conference logo

Playlist "21C3: The Usual Suspects"

Anti-Honeypot Technology

Thorsten Holz

Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots.