3 min readHONEYPOTBuilding a Honeypot to Capture Zero-day Malware, Part 2The Golden Fleece of hackers is to develop a zero-day exploit, an exploit that has not been seen by antivirus (AV) software or and...
4 min readHONEYPOTBuilding a Honeypot to Capture Zero-Day Exploits, Part 1The Holy Grail of any hacker is to develop a zero-day exploit—an exploit that has never been seen by antivirus (AV) or intrusion...
3 min readSCADASCADA Hacking: Testing and Monitoring our SCADA HoneyPotIn the previous article in this series, we built a sophisticated, low-interaction SCADA honeypot with conpot. In this article, we will...
2 min readSCADASCADA Hacking: Building a SCADA HoneypotIn this tutorial, we will be setting up a SCADA/ICS Honeypot. As you know, a honeypot is a computer system that looks and acts like a...