Contents
1. Honeypot and Networking Background
1.1. Brief TCP/IP Introduction
1.2.1 High-Interaction Honeypots
1.2.2 Low-Interaction Honeypots
2.1. Advantages and Disadvantages
2.2.1 Different VMware Versions
2.2.2 Virtual Network with VMware
2.2.3 Setting Up a Virtual High-Interaction Honeypot
2.2.4 Creating a Virtual Honeypot
Get Virtual Honeypots: From Botnet Tracking to Intrusion Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.