Sebek is a data capture tool designed to capture attacker's activities on a honeypot, without the attacker (hopefully) knowing it. It has two components. The first is. Sebek is a data capture tool designed to capture attacker's activities on a honeypot, without the attacker (hopefully) knowing it. It has two. Sebek is kernel module installed on high-interaction honeypots for the purpose of extensive data collection. It allows administrators to collect.
honeypot's kernel. These experiments lead to the development of a tool called Sebek. This tool is a piece of code the lives entirely in kernel. Sebek is based on a client-server architecture. The client is installed on the honeypots and the server is typically deployed on the Honeywall. Contribute to honeynet/sebek development by creating an account on GitHub. Michael A. Davis, at [email protected] or join the honeypots mailing.
Contribute to paralax/awesome-honeypots development by creating an Sebek. Qebek - QEMU based Sebek, a data capture tool for high interaction honeypot. Keywords honeyd, attacks, honeypots, honeynet gateway, honeywall, sebek. 1. “A honeypot is an information system resource whose value lies.