On Monday 22 December 2008 4:20:01 pm Lisa Kachold wrote:
> We need more people willing to build and man honeypots, IDS and complete
> forensics post fest! The challenge is to find all the attack vectors and
> prove encroachment via logs ad loggers for presentation and educational
> contunium after each flag.
>
> Please email me if interested.
I am currently configuring a server under fedora 10... I can create a Xen VM
for a honeypot, so long as my main server is left untouched by intruders, when
time allows. There is nothing sensitive on the main server, and probably will
not be -- just hosting a wordpress blog and a few other toys -- but I would
just rather have it that way and not have to worry about cleaning kernel
rootkits out and such ;) ), I am on winter break right now and will have ample
time to do such things (maybe take part in a few hackfest series' as well)
If this ends up happening would someone be willing to help me set up the
honeypot? (I should be able to set up the Xen environment myself with
tutorials, etc)
Thanks and best,
Ryan Rix
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss