User: Password:
|
|
Subscribe / Log in / New account

Bluepot: A honeypot for Bluetooth attacks

Bluepot: A honeypot for Bluetooth attacks

Posted Feb 21, 2011 3:24 UTC (Mon) by Baylink (guest, #755)
Parent article: Bluepot: A honeypot for Bluetooth attacks

> its logs its internal status in the logs directory of the unpacked tar archive,

I would suggest that it's really logging them in whatever directory was `pwd` when you launched the binary, and that's not all that unreasonable a place for a random binary to drop logs, I don't think; I think that's Kismet's default as well.


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds