Description: This talk will be considered by the concept of aggressive honeypot. The main concept is that "defense can be aggressive" and how this might work. We will also profit by: De-Anonymizing attackers. Filter and find non-bot attacks. Determine the attacker's technical skill level. Get control of the attacker
Also, we will try to answer these questions: Who can use these techniques? Why are they useful? How effective it can be?
And of course we will take a look into real experiment, real samples of attacks, and results from the realization of this idea. We will also cover more interesting things such as which vulnerabilities we can be used- just client-side, or something in 3rd party services? What about social engineering? (All of these can be used, and I'll show how it can be done with real examples!)
For More Information please visit : - http://www.blackhat.com/eu-13/briefings.html
Tags: securitytube , hacking , hackers , information security , convention , computer security , blackhat-eu-2013 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.