10.1 Blast-o-Mat: Using Nepenthes to Detect Infected Clients
10.2 Search Worms
10.3 Red Hat 8.0 Compromise
10.4 Windows 2000 Compromise
10.5 SUSE 9.1 Compromise
Up to this point, we have primarily taken a look at the technique behind honeypots. We have introduced several tools and showed how to set up and configure them. Now we alter our point of view a bit and present some case studies and examples of the lessons learned with honeypots. At first, we introduce an operational example of how to detect infected machines on a network with the help of nepenthes. We present Blast-o-Mat, a custom network intrusion detection system (NIDS), developed and deployed at RWTH Aachen University, Germany. We introduce ...