This document discusses using honeypots to reverse penetrate attackers and gain intelligence on them. It describes how a honeypot was used to collect information from attackers like usernames, source IPs, and intermediate hosts. On some occasions, it allowed gaining access to third party services those attackers had authenticated with. The document concludes honeypots can provide useful intelligence but also raises legal and ethical concerns with counterattacking or collecting personal information.