A detailed look into one of the Project's most powerful tools for capturing
all of an attacker's activity on a honeypot, even encrypted activity, such as
SSH, burneye, and IPSec. This paper covers what Sebek is, its value, how it
works, and how to analyze data recovered by Sebek.
This document is in pdf format. To
view it click here.