This document discusses using honeypots to reverse penetrate attackers and gain intelligence on them. It describes how a honeypot was used to collect information from attackers like usernames, source IPs, and intermediate hosts. On some occasions, it was able to exploit browsers or third party services to gather additional data like email addresses. However, more skilled attackers avoided running untrusted software. The document concludes honeypots can provide useful intelligence but also raises moral and legal issues with counterattacking or exploiting attackers.