Розмір відео: 1280 X 720853 X 480640 X 360
Показувати елементи керування програвачем
Автоматичне відтворення
Автоповтор
You are really good for teaching man. Keep making videos!!
this helped me a lot to understand the basics of honeypots. thanks a lot man.
Excellent explanation💕You should have made more such videos man!!
brilliant talk... very clear and crisp, keep up the good work...
What the heck happend at 16:04 ?
I think he fell down
exellent video! really but where did you get exactly the info to make this great presentation? papers / bibliography?
Valuable informations , thnx :)
How is this different from IDS again?
Hi Sir, very nice video. Are there any ways the attackers know they are in honeypot?
@khoa did u find any?
...omg... were you eating while the presentation ? :-/
I just noticed a bruteforce on my network today. So I setup a linux vm, installed a ssh honeypot and set iptables to direct the traffic to the pot and gave him a successful login :-)Just waiting on the intruder to enter some commands :-)
The intruder is using LoT devices as a few hundred proxies
bigmac turd what happened I'd like to know?
Don't be mean to your dog.
that's one of my tricks. finally catching on. your missing a few items that would make more sense.
Steve Nuts : like what ?
Steve Nuts y
You are really good for teaching man. Keep making videos!!
this helped me a lot to understand the basics of honeypots. thanks a lot man.
Excellent explanation💕You should have made more such videos man!!
brilliant talk... very clear and crisp, keep up the good work...
What the heck happend at 16:04 ?
I think he fell down
exellent video! really but where did you get exactly the info to make this great presentation? papers / bibliography?
Valuable informations , thnx :)
How is this different from IDS again?
Hi Sir, very nice video. Are there any ways the attackers know they are in honeypot?
@khoa did u find any?
...omg... were you eating while the presentation ? :-/
I just noticed a bruteforce on my network today. So I setup a linux vm, installed a ssh honeypot and set iptables to direct the traffic to the pot and gave him a successful login :-)
Just waiting on the intruder to enter some commands :-)
The intruder is using LoT devices as a few hundred proxies
bigmac turd what happened I'd like to know?
Don't be mean to your dog.
that's one of my tricks. finally catching on. your missing a few items that would make more sense.
Steve Nuts : like what ?
Steve Nuts y