Honeypots mailing list archives

Analysis of a Compromised Honeypot


From: Chris Reining <creining () packetfu org>
Date: Fri, 17 Jan 2003 14:45:57 -0600

Hi all -
I whipped up a paper on the analysis of a compromised Redhat 6.2
honeypot. Typical compromise and the attacker used the box to scan other
machines. You can check it out here:

http://www.packetfu.org/hpa.html

Regards,
Chris

Attachment: _bin
Description:


Current thread: