Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Virtual Honeypots: From Botnet Tracking to Intrusion Detection - Graphically Rich Book Table of Contents Copyright Praise for Virtual Honeypots Preface Acknowledgments About the Authors Chapter 1. Honeypot and Networking Background
Section 1.1. Brief TCP/IP Introduction Section 1.2. Honeypot Background Section 1.3. Tools of the Trade
Chapter 2. High-Interaction Honeypots
Section 2.1. Advantages and Disadvantages Section 2.2. VMware Section 2.3. User-Mode Linux Section 2.4. Argos Section 2.5. Safeguarding Your Honeypots Section 2.6. Summary
Chapter 3. Low-Interaction Honeypots
Section 3.1. Advantages and Disadvantages Section 3.2. Deception Toolkit Section 3.3. LaBrea Section 3.4. Tiny Honeypot Section 3.5. GHH - Google Hack Honeypot Section 3.6. PHP.HoP - A Web-Based Deception Framework Section 3.7. Securing Your Low-Interaction Honeypots Section 3.8. Summary
Chapter 4. Honeyd - The Basics
Section 4.1. Overview Section 4.2. Design Overview Section 4.3. Receiving Network Data Section 4.4. Runtime Flags Section 4.5. Configuration Section 4.6. Experiments with Honeyd Section 4.7. Services Section 4.8. Logging Section 4.9. Summary
Chapter 5. Honeyd - Advanced Topics
Section 5.1. Advanced Configuration Section 5.2. Emulating Services Section 5.3. Subsystems Section 5.4. Internal Python Services Section 5.5. Dynamic Templates Section 5.6. Routing Topology Section 5.7. Honeydstats Section 5.8. Honeydctl Section 5.9. Honeycomb Section 5.10. Performance Section 5.11. Summary
Chapter 6. Collecting Malware with Honeypots
Section 6.1. A Primer on Malicious Software Section 6.2. Nepenthes - A Honeypot Solution to Collect Malware Section 6.3. Honeytrap Section 6.4. Other Honeypot Solutions for Learning About Malware Section 6.5. Summary
Chapter 7. Hybrid Systems
Section 7.1. Collapsar Section 7.2. Potemkin Section 7.3. RolePlayer Section 7.4. Research Summary Section 7.5. Building Your Own Hybrid Honeypot System Section 7.6. Summary
Chapter 8. Client Honeypots
Section 8.1. Learning More About Client-Side Threats Section 8.2. Low-Interaction Client Honeypots Section 8.3. High-Interaction Client Honeypots Section 8.4. Other Approaches Section 8.5. Summary
Chapter 9. Detecting Honeypots
Section 9.1. Detecting Low-Interaction Honeypots Section 9.2. Detecting High-Interaction Honeypots Section 9.3. Detecting Rootkits Section 9.4. Summary
Chapter 10. Case Studies
Section 10.1. Blast-o-Mat: Using Nepenthes to Detect Infected Clients Section 10.2. Search Worms Section 10.3. Red Hat 8.0 Compromise Section 10.4. Windows 2000 Compromise Section 10.5. SUSE 9.1 Compromise Section 10.6. Summary
Chapter 11. Tracking Botnets
Section 11.1. Bot and Botnet 101 Section 11.2. Tracking Botnets Section 11.3. Case Studies Section 11.4. Defending Against Bots Section 11.5. Summary
Chapter 12. Analyzing Malware with CWSandbox
Section 12.1. CWSandbox Overview Section 12.2. Behavior-Based Malware Analysis Section 12.3. CWSandbox - System Description Section 12.4. Results Section 12.5. Summary
Bibliography Index
A B C D E F G H I K L M N O P Q R S T U V W X Y Z
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion