PodParley PodParley

Squeezing Attack Traces (25c3)

How to get useable information out of your honeypot

An episode of the Chaos Computer Club - 25C3: nothing to hide (ogg) podcast, hosted by Markus Kötter, Tillmann Werner, titled "Squeezing Attack Traces (25c3)" was published on December 29, 2008 and runs 38 minutes.

December 29, 2008 ·38m · Chaos Computer Club - 25C3: nothing to hide (ogg)

0:00 / 0:00

This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3002.en.html

This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools. about this event: http://events.ccc.de/congress/2008/Fahrplan/events/3002.en.html
URL copied to clipboard!