BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//W3APHA
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-LGTEXR@pretalx.com
DTSTART;TZID=CET:20241022T174500
DTEND;TZID=CET:20241022T181500
DESCRIPTION:Honeypots are invaluable tools for monitoring internet-wide sca
 ns and understanding attackers' techniques. Traditional low-interaction we
 b honeypots use manual methods to emulate various applications or vulnerab
 ilities. Introducing Galah\, an LLM-powered web honeypot that mimics diver
 se applications with a single prompt. This honeypot dynamically crafts rel
 evant HTTP responses\, including headers and body content\, to various HTT
 P requests\, effectively simulating multiple web applications. In this tal
 k\, I will share lessons learned from building and deploying Galah and add
 ress two key questions: How do different large language models perform in 
 generating HTTP messages? Does delivering authentic-looking HTTP responses
  increase attackers’ engagement with the honeypot?
DTSTAMP:20260307T204356Z
LOCATION:Europe - Main Room
SUMMARY:Decoding Galah: an LLM powered web honeypot - Adel Karimi
URL:https://pretalx.com/hack-lu-2024/talk/LGTEXR/
END:VEVENT
END:VCALENDAR
