This research demonstrates a design of an experiment hacker infiltrating server where it is assumed that the communication between and target established, also escalated his rights on server. Therefore, honeypot setup has been designed to reveal correlation hacker’s actions with experience, personality, expertise, psychology. To best our knowledge, such never tested rigorously implementation ex...