Incident Analysis of a Compromised Honeypot
This article reports us an Incident Analysis of a Compromised RedHat Linux 6.2 Honeypot. It's interesting to learn how the author, Stephen Holcroft, developed so many ways to track the intruder and how it discusses what happened.
Read it here.
(Submitted by fabio vayr Mon Apr 15, 2002 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author