We will detect, bypass, and abuse honeypot technologies and solutions, turning them against the defender. We will also release a global map of honeypot deployments, honeypot detection vulnerabilities, and supporting code. about this event: https://events.ccc.de/congress/2015/Fahrplan/events/7277.html