"Strandjs, do you know of case law on hack back? I have not found any. My theory focuses on the CFAA and provides that when using automated responses or code you have not gain unauthorized access to a computer. Many caveats and…"
"There is a live honeypot DVD - Mercury DVD (Ubuntu-based) - that we use internally. It has dionaea, nepenthes, Kippo (ssh honeypot) as well as some reversing tools. Here are a couple of links:
Post on Nepenthes mailing list"