Jefrey Berg, Evan Teran, Sam Stover
Argos is a high-interation honeypot built for new vulnerability discovery -or, to be more accurate, "zero-day vulnerability in use" discovery. We cover the background and architecture of the program, the underlying concepts and the overall functionality, as well as the output. The strengths and the weakness of Argos are examined, and we provide a brief overview of what is necessary to set it up in a realistic scenario to capture explotation information and, possibly, new vulnerability information. Finally, we introduce an independiently developed tool capable of parsing the output generated by Argos.
© 2001-2024 Fundación Dialnet · Todos los derechos reservados