On Monday 22 December 2008 4:20:01 pm Lisa Kachold wrote: > We need more people willing to build and man honeypots, IDS and complete > forensics post fest! The challenge is to find all the attack vectors and > prove encroachment via logs ad loggers for presentation and educational > contunium after each flag. > > Please email me if interested.
I am currently configuring a server under fedora 10... I can create a Xen VM for a honeypot, so long as my main server is left untouched by intruders, when time allows. There is nothing sensitive on the main server, and probably will not be -- just hosting a wordpress blog and a few other toys -- but I would just rather have it that way and not have to worry about cleaning kernel rootkits out and such ;) ), I am on winter break right now and will have ample time to do such things (maybe take part in a few hackfest series' as well) If this ends up happening would someone be willing to help me set up the honeypot? (I should be able to set up the Xen environment myself with tutorials, etc) Thanks and best, Ryan Rix --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss