Using Honeypots to learn about HTTP-based attacks

Excellent article about using Honeypots to learn about the sort of application threats that are prevalent today. The authors go into detail about how they conducted the study and walk the reader through the results. They cover the following set of topics:

  • Code Injection
  • Remote Code-Inclusion
  • SQL Injection
  • Cross-site Scripting
  • Spam
  • Blog Comment Spam
  • Defacements
  • Scanning Tools
  • Botnet Recruitment
  • Phishing

Excellent reading if you’re interested in Internet Security. Read here

One comment

  1. That link goes to a site that tries to install malicious code. Thanks for nothing!

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.