Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request.
Which of the following techniques is employed by Dayn to detect honeypots?
shaody
3 months agosunce12
5 months agoLordXander
7 months, 3 weeks agoinsaniunt
9 months ago