The Honeynet ProjectThe Honeynet Project

  • Old Homepage

Navigation

  • About us
  • Blogs
    • Honeynet Project Blog
  • Funding/Donations
  • Challenges
  • Chapters
  • Papers
  • Projects
  • Code of Conduct
  • Google SoC
    • Google SoC 2018
      • Project Ideas
      • Application Tips
      • Student Template
    • Google SoC 2017
    • Google SoC 2016
    • Google SoC 2015
    • Google SoC 2014
    • Google SoC 2013
    • Google SoC 2012
    • Google SoC 2011
    • Google SoC 2010
    • Google SoC 2009
  • Recent posts
  • Security Workshops
    • 2018 - Taiwan
    • 2017 - Canberra
    • 2016 - San Antonio
    • 2015 - Stavanger
    • 2014 - Warsaw
    • 2013 - Dubai
    • 2012 - SF Bay Area
    • 2011 - Paris

Internal

  • Login
  • Recent posts
Home

San Antonio

Honeynet Project Workshop | 9-11 May 2016 | San Antonio, TX, USA

Fri, 11/27/2015 - 13:51 — andrea.depasquale

San Antonio 2016 Read more »

  • HNW2016
  • San Antonio
  • workshop
  • andrea.depasquale's blog
  • Twitter logo Twitter
  • Facebook logo Facebook
  • LinkedIn logo LinkedIn
Syndicate content
Blog Feed
LinkedIn
Facebook
Twitter
YouTube

We are a 501c3 non-profit, all volunteer organization. Consider donating to support our forensic challenges, tools development, and research.

Latest tweets

@ProjectHoneynet tweetsfollow @ProjectHoneynet

Papers

  • Know Your Enemy: Containing Conficker
  • Know Your Enemy Lite: Proxy Threats - Socks v666
  • Know Your Enemy: Malicious Web Servers
  • Know Your Enemy: Fast-Flux Service Networks
  • Know Your Enemy: Behind the Scenes of Malicious Web Servers
  • Know your Enemy: Web Application Threats
  • Know Your Enemy: A Forensic Analysis
  • Know Your Enemy: Defining Virtual Honeyents
  • Know Your Enemy: GenII Honeynets
  • Know Your Enemy: Honeynets
  • Know Your Enemy: Honeynets In Universities
  • Know Your Enemy: Honeywall CDROM
  • Know Your Enemy: Learning with User-Mode Linux
  • Know Your Enemy: Passive Fingerprinting
  • Know your Enemy: Phishing
  • Know Your Enemy: Sebek
  • Know Your Enemy: Statistics
  • Know Your Enemy: The Social Dynamics of Hacking
  • Know your Enemy: Tracking Botnets
  • Know Your Enemy: Trends
  • Know Your Enemy: Worms at War
  • Know Your Tools: Glastopf - A dynamic, low-interaction web application honeypot
  • Know Your Tools: Qebek – Conceal the Monitoring
  • Know Your Tools: use Picviz to find attacks
  • Know Your Enemy: Automated Credit Card Fraud
  • Know Your Enemy: Motives
  • Know Your Enemy: III
  • Know Your Enemy: II
  • Know Your Enemy: I