ºÝºÝߣs from the Lightning Talk session in FIRST Annual Conference 2017, about the honeypot I observed by ShinoBOT.
Due to the time (5min), I extremely shrink my slide, so it is a very partial data.
20. "TO BE SPOTTED" does matter?
? Yes
? The attacker will create next malware which avoids
to be run on the honeypots/malware analytics
system/sandboxes
21. CONCLUSION
? Make your Honey pot "human-y" ¨P dirty
? Make your Honey pot "random"
? Use an IP address which does not related with you
¨C Cloud service should be good