Intrusion Detection Honeypots Logo

Intrusion Detection Honeypots

0
Free
Updated 11 March 2025
Visit Website

With the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals. IDH redefines the role of honeypots and demonstrates why they are a critical facet of network defense. Practical Packet Analysis (Third Edition) will teach you to make sense of your packet captures so that you can better troubleshoot network problems and investigate security incidents.

FEATURES

SIMILAR TOOLS

A tool for enumerating subdomains of a given domain

An extended traceroute tool for CSIRT operators with advanced features.

A tool for discovering and enumerating external attack surfaces

A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

A technique to associate applications with TLS parameters for identifying malware and vulnerable applications.

A cross-platform network detection tool that identifies Responder presence by sending LLMNR queries for non-existent hostnames.

Azure DDoS Protection and Mitigation Services by Microsoft Azure for secure cloud solutions.

Django based web application for network traffic analysis with protocol handling capabilities.

Smart traffic sniffing tool for penetration testers

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved