{"guid":"import-156740b6457fd900b9","title":"Squeezing Attack Traces","subtitle":"How to get useable information out of your honeypot","slug":"25c3-3002-en-squeezing_attack_traces","link":"http://events.ccc.de/congress/2008/Fahrplan/events/3002.en.html","description":"This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep understanding about what attacks do and how they work. A live demo will be given to demonstrate the usage of those tools.\n","original_language":"eng","persons":["Markus Kötter","Tillmann Werner"],"view_count":18,"promoted":false,"date":"2008-12-29T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2025-01-20T23:15:03.422+01:00","tags":["25c3"," Hacking"],"length":2282,"duration":2282,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-3002-en-squeezing_attack_traces.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-3002-en-squeezing_attack_traces_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-156740b6457fd900b9-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-156740b6457fd900b9-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-3002-en-squeezing_attack_traces","url":"https://api.media.ccc.de/public/events/import-156740b6457fd900b9","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[],"recordings":[{"size":292,"length":2282,"mime_type":"audio/ogg","language":"eng","filename":"25c3-3002-en-squeezing_attack_traces.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:47.414+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-3002-en-squeezing_attack_traces.ogg","url":"https://api.media.ccc.de/public/recordings/2377","event_url":"https://api.media.ccc.de/public/events/import-156740b6457fd900b9","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":292,"length":2282,"mime_type":"video/mp4","language":"eng","filename":"25c3-3002-en-squeezing_attack_traces.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.781+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3002-en-squeezing_attack_traces.mp4","url":"https://api.media.ccc.de/public/recordings/2376","event_url":"https://api.media.ccc.de/public/events/import-156740b6457fd900b9","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":292,"length":2282,"mime_type":"video/webm","language":"eng","filename":"25c3-3002-en-squeezing_attack_traces.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.811+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-3002-en-squeezing_attack_traces.webm","url":"https://api.media.ccc.de/public/recordings/2375","event_url":"https://api.media.ccc.de/public/events/import-156740b6457fd900b9","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}