{"guid":"import-5a4a8c1099b9cb88ee","title":"Anti-Honeypot Technology","subtitle":null,"slug":"109_Anti-Honeypot_Techniques","link":"http://www.ccc.de/congress/2004/fahrplan/event/109.en.html","description":"Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots.\n","original_language":"eng","persons":["Thorsten Holz"],"tags":["21c3"," Hacking"],"view_count":154,"promoted":false,"date":"2004-12-28T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:14.597+02:00","length":3341,"duration":3341,"thumb_url":"https://static.media.ccc.de/media/congress/2004/109 Anti-Honeypot Techniques.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/109 Anti-Honeypot Techniques_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-5a4a8c1099b9cb88ee-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-5a4a8c1099b9cb88ee-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/109_Anti-Honeypot_Techniques","url":"https://media.ccc.de/public/events/import-5a4a8c1099b9cb88ee","conference_title":"21C3: The Usual Suspects","conference_url":"https://media.ccc.de/public/conferences/21c3","related":[{"event_id":22,"event_guid":"import-d9fdeee55d49ce271e","weight":4},{"event_id":704,"event_guid":"import-66eca4edef506d610a","weight":3},{"event_id":706,"event_guid":"import-b5dce9131ee2c352f1","weight":9},{"event_id":707,"event_guid":"import-656b0b8a34f30c8add","weight":4},{"event_id":708,"event_guid":"import-1d60732e54a7b8cbdb","weight":3},{"event_id":709,"event_guid":"import-86dcc5d427d763434f","weight":3},{"event_id":710,"event_guid":"import-996ee6767784dc2e88","weight":3},{"event_id":742,"event_guid":"import-8e99ee5524fb2d218b","weight":3},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":3},{"event_id":842,"event_guid":"import-c767cd58e7116fb747","weight":5},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":3},{"event_id":859,"event_guid":"import-75dd511530fcb882b6","weight":4}],"recordings":[{"size":58,"length":3341,"mime_type":"audio/mpeg","language":"eng","filename":"109 Anti-Honeypot Techniques.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:33.612+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/109 Anti-Honeypot Techniques.mp3","url":"https://media.ccc.de/public/recordings/1476","event_url":"https://media.ccc.de/public/events/import-5a4a8c1099b9cb88ee","conference_url":"https://media.ccc.de/public/conferences/21c3"},{"size":58,"length":3341,"mime_type":"video/mp4","language":"eng","filename":"109 Anti-Honeypot Techniques.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:14.278+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/109 Anti-Honeypot Techniques.mp4","url":"https://media.ccc.de/public/recordings/1475","event_url":"https://media.ccc.de/public/events/import-5a4a8c1099b9cb88ee","conference_url":"https://media.ccc.de/public/conferences/21c3"}]}