http://www.honeynet.org/

Take a look at the Honeynet Project site at The Honeynet Project, specifically at the “Challenges”
section. Read through the different challenges that have been issued. While it
serves as a great source of information for analyzing attacks for the security
community, it might also serve as a great source of information for attackers!
Explain how defenders and attackers might successfully utilize this site. Is
there anyway to manage who gets access to this information?