It is usually assumed that Honeynets are hard to detect and that attempts to
detect or disable them can be unconditionally monitored. We scrutinize this
assumption and demonstrate a method how a host in a honeynet can be completely
controlled by an attacker without any substantial logging taking place