Further reading
To learn more on the subject, check out the following resources:
- Portspoof examples: https://adhdproject.github.io/#!Tools/Annoyance/Portspoof.md
https://www.blackhillsinfosec.com/how-to-use-portspoof-cyber-deception/
- LaBrea tarpit honeypot: https://labrea.sourceforge.io/labrea-info.html
- Configuring the Tarpit Honeypot in Microsoft Exchange: https://social.technet.microsoft.com/wiki/contents/articles/52447.exchange-2016-set-the-tarpit-levels-with-powershell.aspx
- WebLabyrinth: https://github.com/mayhemiclabs/weblabyrinth
- Thinkst Canary honeypot: https://canary.tools/
- The Internet Storm Center's DShield Honeypot project: https://isc.sans.edu/honeypot.html
- Strand, J., Asadoorian, P., Donnelly, B., Robish, E., and Galbraith, B. (2017). Offensive Countermeasures: The Art of Active Defense. CreateSpace Independent Publishing.