
ISC StormCast for Wednesday, January 31st, 2024
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
00:00
Unveiling Honeypot Detection Tactics
This chapter explores the strategies employed by attackers to discern honeypots from genuine systems, with a particular focus on the DeShield honeypot and its use of Kauri. It details methods like checking for specific executable files and analyzing command outputs, revealing how attackers often disconnect once they detect they are being monitored.
Transcript
Play full episode