This page is updated (check the update date at the end) every week after each session.

Course Description

The subject of this course is to use the Honeynet/pot technologies as a tool to discover and learn existing and new threats to networked/distributed information system. The course includes a project to build a custom honeypot for security awareness to turn the theory into a practical approach to raise awareness about security issue. A section of the course is covering the aspect of "forensic analysis" and its implication in information security.

Given by : Alexandre Dulaunoy


Date/Where Topic Support
Sat. 09 January 2010 (9:00->12:00)/University of Luxembourg (Kirchberg) Forensic Analysis, The Treachery of Images. Theory and Practices in Forensic Analysis. Forensic Analysis - The Treachery of Images Supporting papers : Order of Volatility - Memory as Example,Password in memory,Flash and Forensic Analysis
Sat. 24 April 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg) Honeypots and honeynets, a way to gather information about security attacks and the attackers. An introduction to honeypot and honeynet technologies. Berkeley Packet Filter and Network Analysis. Support and data for the network analysis.
Sat. 8 May 2010 (13:30>16:30)/A.17/University of Luxembourg (Kirchberg) Network scanning and discovery. Workshop about Wordpress security and the opportunities for the attackers. Network and Services Discovery Conclusion - Learning from the attacker

Sessions - Additional Support


You may find that the subject is too experimental and not yet mature for real-life application. If you have any issue with the course (including the way I teach it), don't hesitate to talk about as soon as possible.