Squeezing Attack Traces
How to get useable information out of your honeypot
Veröffentlicht am: 29.12.2008, 16:00 Uhr
Präsentation vom: 29.12.2008, 16:00 Uhr
Autor: Markus Kötter, Tillmann Werner
Abstract: This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools.
Speakers: Markus Kötter, Tillmann Werner
Language: en
Date: 2008-12-29
Time: 16:00
Room: Saal 3