±Forensic Focus Partners
New Today: 1
New Yesterday: 8
±Follow Forensic Focus
· Evidence Acquisition and Analysis from iCloud
· TSFIC 2015 – Myrtle Beach 31st May – 3rd June
· Forensics Europe Expo 2015 – Recap
· Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets
· TDFCon 2015 – Middlesbrough 15th May
· Electronic Voiceprints: The Crime Solving Power of Biometric Forensics
· DFRWS Europe 2015 Annual Conference – Recap
· DFRWS EU 2015 – Dublin 23rd – 26th March
· SQLite Database Forensics – ‘Sleep Cycle’ Case Study
My project scenario is a hacker not realising it's a honeypot.
I would give for acquired that you don' t have "Hey, I am an honeypot!" printed all over the pages of the site.
Earlier you stated how the idea was "someone hiding their tracks on an honeypot".
So I am not getting it.
I mean, does the hypothetical hacker ALWAYS try to hide his/her track on ANY site?
Then the dissertation is about "how to find attempts to hide tracks on *any* site" or "techniques used by hackers to cover their tracks".
Or it is about techniques used (or to be used) by the "good guys", and then the dissertation is about "how to create a honeypot capable of preventing tracks hiding by hackers" or "how to use honeypot techniques on your site to prevent tracks hiding by hackers".
Same goes for:
Do you know if honeypot log files can be used as evidence in a UK court?
I mean in which way a honeypot log file is different from any other website log file?
- In theory there is no difference between theory and practice, but in practice there is. -
- Senior Member