Turning Honeypots into an Offensive Toolkit to Secure Critical Assets
When you deal with critical information, wealth, complex infrastructures or you’re a product provider for casual users, you must be ready for worse and take proactive measures in order to defend and prevent incidents from damaging your network, assets, reputation or leak sensitive information. In any kind of attack, there is a short amount of time when attackers are most vulnerable. The talk will introduce several perspectives and also examples of how we can fingerprint, misguide or counter-attack the intruder. We will also discuss about IoT, honeypots, offensive approaches, APTs, malware and multi-layered counter-attacks and minimal requirements to protect your devices against “cyber slavery”.