This document discusses the use of honeynets to detect exploited systems and hackers. It begins with an abstract and introduction on the topic. It then provides definitions of key terms like honeynet and honeypot. It describes the principles of data capture and data control that honeynets rely on. It discusses the differences between first (GEN I) and second (GEN II) generation honeynets. It outlines the typical honeynet architecture including honeypots and honeywalls. It explains how honeynets work to study attacker activities and methods. Finally, it discusses some advantages like high value data and simplicity, and disadvantages like narrow field of view of using honeynets.