How to detect and study attackers with an S7 honeypot