5 lines
224 B
Plaintext
5 lines
224 B
Plaintext
Nepenthes can determine the malware activity on a network
|
|
by deploying a nepenthes sensor (i.e. honeypot). The programm
|
|
emulates different well known vulnerabilities waiting for
|
|
malicious connections trying to exploit them.
|