The Honeynet Workshop is the leading forum for early warning systems, cyber deception, and open source security tools to improve internet security. The workshop program consists of one day of invited talks and two days of trainings, held by a diverse set of experienced international speakers and trainers.
Time | Topic | Speaker |
---|---|---|
09:00–09:15 | Introduction to the WorkshopIntroduction to The Honeynet Project from the CEO. | ![]() Emmanouil Vasilomanolakis |
09:15–10:00 | 'Welcome to the Party, Pal': How Die Hard Can Help Us Design Cyber Deception Influence Models Built on Signaling More Than InfrastructureThis keynote presentation by a cyber deception practitioner argues that behaviorally based cyber deception influence models —those that communicate public signals or displays of network vulnerabilities and strengths— could become one of the most effective deterrents to attackers. This provocative argument challenges traditional COTS approaches to cyber deception. Drawing from his unique experiences developing and operationalizing cyber deception programs in both industry and government, Pappa will introduce three behaviorally based models of cyber deception influence. These models will be framed by disruptive moments in Die Hard, where Det. John McClane single-handedly influenced a dozen terrorists inside Nakatomi Plaza on Christmas Eve. | ![]() Tim Pappa |
10:00–10:30 | VelLMes - How Generative AI Can Help Cyber Deception and Defense?This talk presents VelLMes, a framework that uses large language models to simulate interactive services like SSH (shelLM), MySQL, POP3, and HTTP for honeypot deployment. We explore the benefits and limitations of LLM-driven deception, evaluating both service simulation and deception capabilities. The talk raises key questions about measuring deception effectiveness and highlights future directions for generative AI in cybersecurity beyond honeypots. | ![]() Muris Sladić |
10:30–10:45 | Lightning Talk: Introducing DICOMHawk: A High-Interaction Medical HoneypotThis lightning talk presents DICOMHawk, an open-source Python-based honeypot simulating the DICOM protocol, a medical standard for storage and transmission of medical imaging data. DICOMHawk offers a higher level of interaction compared to the current standard DICOMpot, with DICOMHawk not being detected as honeypot by Internet-level scanners, like Shodan. It implements realistic DICOM commands, honeytokens, comprehensive logging and a user-friendly web interface. These features help security practitioners and researcher to gain deep insights into the threat landscape and Internet-level scanners. This demo introduces DICOMHawk’s architecture, its functionality and usefulness. | ![]() Karina Elzer |
Coffee Break | ||
11:00–11:30 | Koney: Cyber Deception Policies for KubernetesManually injecting a fleet of decoys into applications and detecting access attempts to them isn’t straightforward. Kubernetes, the dominant platform for modern software development, offers a great foundation into which we can easily integrate traps to detect hackers. This talk will introduce Koney, a first-of-its-kind operator - that is, a “plugin for Kubernetes” - that allows you to define so-called deception policies for clusters. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when traps have been accessed. This talk will present how application layer cyber deception techniques can be formalized “as code” and what technical methods can be used to inject traps at runtime, all without requiring access to source code. We will continue with a live demonstration of how Koney can place honeytokens in application containers in seconds. Participants can leave with a better understanding on how cyber deception can be formalized in policy documents and be equipped with a functional open-source tool [1], Koney, that lets them experiment with cyber deception in their own environments. | ![]() Mario Kahlhofer |
11:30–12:00 | Hi Fidelity != High Effort: Meet DECEIVE, the AI-backed SSH HoneypotDeploying a realistic honeypot is a lot of work. What kind of system is it? Who are the users? What applications does it have? Who’s going to create all the files and documents it takes to make a compelling trap? And that’s just for one honeypot. Deploying a realistic network of servers can be a major undertaking. That’s why we created DECEIVE, an Open Source, AI-backed honeypot that you can deploy with as little effort as it takes to write a single sentence. It’s high fidelity simulation with minimal effort. | ![]() David Bianco |
Lunch Break | ||
13:30–13:45 | Lightning Talk: Cyber Counterintelligence challenges - Deceiving adversaries through influence operationsThe goal of this talk is to explain the critical challenges of cyber counterintelligence, emphasizing the importance of deception and focusing on using influence operations to deceive adversaries. Deception is essential in cyber counterintelligence to disrupt adversary activities and protect our interests. Influence operations are a powerful tool for manipulating information and the adversary’s perception of reality. In the modern cyber domain, deception via influence operations presents unique challenges and opportunities—and is becoming increasingly important. The main message is: effectively deceiving adversaries through well-crafted influence operations is not only beneficial but necessary to protect the interests and strategic advantage of every company. Just think about it! | ![]() Ondrej Nekovar Jan Pohl |
13:45–14:00 | Lightning Talk: IntelOwl Project - making the life of security analysts easier,Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. It integrates a number of analyzers available online and a lot of cutting-edge malware analysis tools. It is for everyone who needs a single point to query for info about a specific file or observable. This Lightning Talk will guide the audience through how this software works and how it can be leveraged by security analysts to save time and optimize their work during their day-to-day activities. | ![]() Daniele Rosetti |
14:00–14:30 | Bot-any of Stagers: Understanding the Landscape of Malware Staging Servers in RCE botnetsThis talk focuses on the RCE vulnerabilities in IoT devices that botnets frequently exploit to infect new devices. As these methods have only become more prevalent as an infection vector, we use a large block of passive IPs also known as a network telescope and two smaller blocks of IPs or ‘reactive telescopes’ that emulate unresponsive services on all ports to capture these RCE attempts and characterize the attacks and behaviors of groups that target these vulnerabilities. We further flesh out the underlying infrastructure and practices, and where this method fits in between completely passive measurements methods and fully emulated honeypots in the detection spectrum and the unique insights we can gain from this method. We also use the insights gained from running this experiment to explore further additions and improvements to our setup and the future of existing techniques used to combat these attempts and then whether we can use newer methods to disrupt these botnets. | ![]() Murtuza Ali |
14:30–15:00 | Detecting open-source HoneypotsThis talk dives into how open-source honeypots like Cowrie, Conpot, Dionaea, and Glastopf can be detected in the wild. These tools are widely used to lure and monitor attackers, but they often have small giveaways—quirks in behavior or implementation details—that can expose them as traps. We will start with a quick overview of how these honeypots work/look, then move into real-world examples where they were identified through subtle signs. From there, we will look at how detection can be scaled using tools like Nuclei, making it possible to scan larger environments efficiently. The goal is to show both red and blue teams how honeypots can be fingerprinted, why that matters, and what can be done to make them harder to detect. | ![]() Anastasiia Dorosh |
Coffee Break | ||
15:15–15:45 | Stealing the Stealer: Catching Data Exfiltration with DeceptionData exfiltration remains one of the hardest threats to detect. Attackers can silently read and steal sensitive data without triggering traditional security controls—file reads are rarely logged, and DLP solutions are often bypassed. But what if we could turn the attacker’s tactics against them? This talk introduces a novel approach using Virtual Filesystem (VFS)-based deception to project believable but fake data files, credential stores, and crypto wallets that silently track unauthorized data access. Unlike traditional beaconing documents, which relies on external callbacks that can be blocked, this method detects exfiltration attempts at the moment of access using M-out-of-N access patterns to reduce noise and false positives. Attendees will learn how Honeytoken type deception techniques can alert to data-stealing attackers in real-time—without disrupting legitimate users. | ![]() Rajaram Bhaskaran |
15:45–16:15 | Staying Up-to-Date with SMS Scams: Building a Smishing HoneypotIn the last few years, SMS-phishing (smishing) has significantly increased. Getting blocked by telcos over SMS, adversaries have started to shift from SMS to online communication services such as RCS and iMessage to evade detection. Due to the lack of open-access, up-to-date data, it is challenging to identify these evolving techniques scammers use to target users; let alone build effective mitigations. During this talk, presenters will showcase the infrastructure of a working honeypot deployed in the UK and Germany. It has already collected over 100 real-world scam messages in a timely and accurate fashion across SMS, RCS, and iMessage. The participants will learn about the strategic seeding mechanism we use to ensure our honeypot numbers are targeted by scammers while minimizing generic spam. The talk will also present an overview of our results, including two unique case studies - possible identification of SMS blasters and the other validating the system’s reach into active criminal networks. | ![]() Marie Vasek ![]() Sharad Agarwal |
Coffee Break | ||
16:30–17:00 | Evolution of banking threats in LATAM, a detailed review of MispaduThis talk will explore the evolution of banking threats across Latin America (LATAM), with a particular focus on threat actors originating from Brazil. We will begin with a brief overview of the primary threat actors currently targeting the region. The main focus will be on Mispadu, a Malware-as-a-Service (MaaS) platform that has been actively targeting Mexico and other LATAM countries over the past few years. We will compare campaigns from two years ago to current activity, highlighting changes in delivery methods, obfuscation techniques, and infrastructure. Key takeaways include:
The session will also present a step-by-step breakdown of Mispadu’s deployment techniques, including how obfuscation methods have changed over time. | ![]() Hugo Gonzalez |
17:00–17:15 | Lightning Talk: HUGO Honeynet projectCESNET has recently started a project of building a honeynet distributed across organizations in different sectors. It is based on preconfigured VMs with Cowrie and Dionaea honeypots, made such that it is quick and easy to deploy even for an unexperienced network admin. After a simple registration process, all data captured by the honeypots are automatically shared to Warden, the data sharing platform operated by CESNET, so they can be centrally analyzed. The goal of the talk is to briefly present the project and explore the possibilites for collaboration with the Honeynet Project community. | ![]() Vaclav Bartos Pavel Valach |
17:15–17:45 | How Threat Actors Deceive Researchers via Unpopular SoftwareNowadays, financially motivated adversaries are constantly looking for new ways to obtain initial access into target organizations. One particular method that attackers recently started using for this purpose is deploying malicious implants through unpopular legitimate software. While using such an infection vector, attackers often manage to deceive security analysts, who commonly classify alerts originating from such software as false positives. During this talk, we will share details of a recent malicious campaign that was orchestrated through an infection of unpopular software. We initially started its analysis from an inspection of two domain names, which looked suspicious to us. During the presentation, we will firstly discuss how we used community-based threat intelligence tools to pivot from these domains to the executables of compromised software. Afterwards, we will establish the timeline of the software infection by examining open-source information available about it. Following that, we will describe the malicious code implanted into the software and analyze the final payload dropped by it, which is a previously unknown Python-based stealer. This talk, as well as the live demonstrations offered throughout it, will allow attendees to better understand how crowdsourced threat intelligence instruments can be leveraged to conduct threat hunting activities, as well as gain experience in handling obfuscated Python malware. | ![]() Georgy Kucherin |
17:45–18:00 | Closing Remarks | ![]() Sebastian Garcia |
18:00 | Social DinnerThe social event will take place at Cafe Prostoru_ (Technická 2710, 160 80 Praha 6), located in the same building as the conference.Following the Closing Remarks session, further instructions will be provided to guide attendees to the social event area. |
We have an exciting line-up of trainings for Tuesday and Wednesday. The training schedule will be finalized based on participants' interest shortly.
Slot | Training | Trainer |
---|---|---|
Tuesday morning | T-Pot 101 Workshop - Your Gateway into the world of Cyber Deception and HoneypotsWelcome to T-Pot 101, an hands-on workshop crafted for those looking to dive into the vast capabilities of the All-In-One honeypot platform - T-Pot. Tailored for beginners, this workshop is the first step towards mastering setup, installation, and basic configuration of a deception system. 🌐 What We Offer:
Join us for learning and exploration, conducted by the authors of T-Pot. Note: Students are required to bring their own laptops capable of running virtual machines in bridged networking mode. Minimum specifications are: a processor with 8 CPU cores (i.e. Apple M1 Pro+, Core i5 12th gen+, Ryzen 5 5th gen+, 16GB of RAM, and 512GB of fast storage (SSD or NVMe). For best results, the laptop must be able to dedicate at least 4 CPU cores, 8GB of RAM and 64GB of free disk space to the virtual machine. | ![]() Marco Ochse ![]() Elias Flotzinger |
Tuesday morning | Analysis of honeypot network traffic at scaleIn this training we’ll look at a pcap captured on a webserver machine https://www.malware-traffic-analysis.net/2025/04/13/index.html. We’ll identify the clients/server, protocols seen, different types of scans and find different types of attacks that it contains (reconnaissance, Reflection Amplification DDoS Attacks, Remote Code Execution, etc.). The pcap, methodology and tools are representative of analysis of honeypot network traffic at scale. We’ll be using tools such as Zeek, Suricata and Wireshark to extract metadata from the traffic, DuckDB to filter the data, Google Gemini and ChatGPT to better understand the attacks we’re seeing. At the end of the training the students will:
| ![]() Anthony Verez |
Tuesday morning | Reverse Engineering with GhidraThis course provides a hands-on introduction to using Ghidra for software reverse engineering, taught by co-author of The Ghidra Book: The Definitive Guide. Learn how to use and customize Ghidra to fit your SRE workflow, all presented with hands-on examples and plenty of crackme challenges. Whether you are new to the field of reverse engineering, new to Ghidra, or just want a refresher to participate in the Reverse Engineering Capture the Flag (CTF), this course provides you with the opportunity to explore the capabilities of this powerful open source reverse engineering tool suite to understand how it can enhance your reverse engineering process. Hands-on labs will provide flexibility for students to choose between basic and challenge assignments to ensure that everyone has something interesting to explore in context. All challenges will be completed in a browser-accessible, pre-configured environment—just bring your laptop, a modern web browser, and some curiosity. | ![]() Kara Nance Brian Hay |
Tuesday afternoon | Designing Behaviorally Based Sock Puppets to Support Your Cyber Deception EffortsThis workshop will walk you through the design process for creating behaviorally based sock puppets to support any size deception program or project. It is tailored for beginners as well as advanced practitioners. The session will concentrate on the behavioral foundations of designing and building sock puppets and operating those deception artifacts. In this workshop, participants:
| ![]() Tim Pappa |
Tuesday afternoon | Interactive Fingerprinting WalkthroughThis three-hour, hands-on workshop guides participants through the end-to-end workflow of modern passive network fingerprinting - covering JA3, JA3N, JA4, p0f and MuonFP - and demonstrates how to turn raw fingerprints into actionable defenses. After a brief welcome and taxonomy overview, attendees will dive into live TLS captures to dissect the ClientHello, extract JA3 signatures and normalize them to JA3N. After that we will explore the enhanced fields of JA4 - a JA3 successor. Next, we’ll shift to TCP/IP fingerprinting, using p0f to identify OS and tool patterns, then generate MuonFP fingerprints to reveal tunneling overhead and sequence quirks. Finally, you’ll learn how to translate your MuonFP-derived p0f signatures into a BPF filter, compile and deploy it in real traffic, and verify that unwanted scanners are dropped at the wire. Throughout the session, each concept is taught through live demos and interactive labs, helping you to generate, interpret and apply network fingerprints immediately in your own defensive workflows. | ![]() Vlad Iliushin |
Tuesday afternoon | Reverse Engineering CTFCapture the Flag (CTF) events are competitive games where participants earn points by uncovering hidden “flags”—specific pieces of data embedded in challenges. This CTF is designed to give you hands-on experience applying reverse engineering skills using Ghidra. You’ll work through a diverse set of crackmes—small executable challenges crafted to test your ability to analyze and manipulate binary code. The challenges range in difficulty, making the event suitable for everyone from first-time reverse engineers to seasoned CTF players. All challenges will be completed in a browser-accessible, pre-configured environment—just bring your laptop, a modern browser, and your enthusiasm for solving puzzles. If you’re new to reverse engineering or CTFs, don’t worry: beginner-friendly training materials and guided walkthroughs will be available to help you build confidence and skills. Come explore what Ghidra can do, and level up your reverse engineering abilities in a fun, supportive setting! | ![]() Kara Nance Brian Hay |
Wednesday morning | Android malware reversing 101The goal is to inroduce the attendants to the world of reversing Android malware. It would be focused on static analysis after understanding the entry points for Android apps and how to look for clues in the code. The main tool to use will be apktools and go deep in the obtained smali code. Also at the end more tools will be presented for users interested in continue with the journey of androd malware analysis. | ![]() Hugo Gonzalez |
Wednesday morning | Translating Threats into Deception StrategiesDefining cyber deception strategies in production environments is a complex challenge. This training is oriented to people who want to learn how to translate Tactics, Techniques, and Procedures (TTPs) into concrete cyber deception activities and plans in this guided hands-on lab. Participants will work in teams through a simple methodology with four phases: behavior extraction, criteria selection, mapping TTPs to deception activities, and storytelling design. Teams will develop effective deception strategies for real-world scenarios. After an introduction to the topic, the hands-on labs will be divided into four phases, each including an exercise and a theoretical summary of the concepts. Participants will work in teams of 3-4 people to encourage synergy between the different profiles involved. During each phase, participants will have access to an online spreadsheet to record their notes in the form of a logbook. At the end, the strategies proposed by each team will be compiled and shared in real time to evaluate the criteria applied and the potential effectiveness of the proposed scenarios. The main goal is to provide a practical and minimalistic experience on how to design and contextualize deception strategies based on threat behaviors, aligning them with clear defensive objectives. Takeaways:
| ![]() Federico Pacheco |
Wednesday afternoon | Getting Your Hands Dirty: Dissecting Malware Traffic to Understand Attackers BehavioursThis hands-on training focuses on the essential skill of understanding malware behavior on the network. It’s designed to provide practical experience in identifying malicious connections, distinguishing between normal and suspicious activity, recognizing unusual patterns, and handling large volumes of traffic. The key takeaway is not just learning how to use tools, but gaining the experience needed to spot malware’s actions on the network. You’ll learn how malware hides, how to recognize encryption methods, how to analyze web traffic patterns, and how to filter out false connections. By analyzing malware, you’ll learn to think like an attacker and gain the skills needed to effectively analyze network traffic for malicious behavior. | ![]() Sebastian Garcia |
Wednesday afternoon | Perception vs. Perspective: Doublespeak and the Control of RealityThis workshop examines the mechanisms of psychological manipulation through the intersecting lenses of language, perception, and cognitive warfare. Grounded in Orwellian theory and Cold War-era influence operations, it investigates how doublespeak and ideological framing distort reality and shape identity. In an age where truth and fiction increasingly converge, the workshop analyzes the strategic use of language as a tool of control and a weapon, focusing on techniques such as conformity induction, learned helplessness, and the fragmentation of narrative identity. Emphasizing the distinction between perception (sensory input) and perspective (interpretive filter), the workshop explores how these constructs are exploited to shape belief systems and behaviors. Participants engage in immersive, experiential exercises—including “Truth Reassignment” and “Contradiction Circle”—designed to simulate real-time cognitive manipulation and reveal the subtle mechanisms behind belief alteration. Through a multidisciplinary approach combining theoretical frameworks, historical case studies, and guided reflection, the workshop equips attendees with practical strategies for cognitive resistance. Topics such as semantic overload, doublespeak, and cognitive dissonance are explored as instruments of epistemic control, while media literacy, linguistic precision, and metacognitive awareness are emphasized as essential tools of defense. Participants will learn to question prevailing assumptions, recognize manipulative framing, and cultivate the clarity needed to resist narrative coercion and reclaim interpretive agency in an era of pervasive psychological influence. Key Takeaways:
| ![]() Gregory Carpenter |