Skip to content

Learning

Looking to start your career in IT ?

3 Topics 15 Posts
  • Network Security Monitoring

    7
    3 Votes
    7 Posts
    183 Views

    @phenomlab I will check those out. Thanks for sharing. I appreciate it!

  • Studying

    5
    1 Votes
    5 Posts
    630 Views

    @JAC I am curious too as to which route you chose. It has been a little more than a couple of years.

  • Honeypot Data Capture

    Solved
    3
    1 Votes
    3 Posts
    335 Views

    @jbarber1976 just thinking a little more about this in terms of how to structure such a honeypot. The real issue here is that the honeypot itself will only be useful if the source IP is correct - for example, not hidden behind a VPN or reverse proxy.

    In this case, the information you’d gain would be useless as it would only direct you to the VPN host, and not the actual perpetrators, which of course, is the primary goal.

    I’d need more information to be able to comment further.