I work at a firm where there are multiple honeypots deployed, So these honeypots detect even if you run a simple ping sweep. How do pentesters detect/avoid honeypots?
There are approx 250 Network decoys sitting on a network.
I work at a firm where there are multiple honeypots deployed, So these honeypots detect even if you run a simple ping sweep. How do pentesters detect/avoid honeypots?
There are approx 250 Network decoys sitting on a network.
This topic was automatically closed 3 days after the last reply. New replies are no longer allowed.