https://www.sans.org/reading-room/whitepapers/ActiveDefense/active-defense-deceptive-configuration-techniques-36692