CONFidence 2025: Jacek Lipkowski - YouPot - where the attacker is the honeypot

youtube.com 2 miesięcy temu


Turn attackers into your sensors. Learn how a protocol-agnostic honeypot captures worms, bots, and malicious traffic by utilizing the attacker’s own machine.

Find out more at: https://confidence-conference.org/