August 26th, 2002, 09:56 AM
What is honeypot?
sorry to ask u this guys.. i guess this is not a lame question. im a newbie and i dont know what is the meaning of honeypot?
August 26th, 2002, 10:04 AM
Useing google I just did a search for you and found this excelent discription of what a honeypot is
In snatches, they learn something of the wisdom
which is of good, and more of the mere knowledge which is of evil. But must I know what must not come, for I shale become those of knowledgedome. Peace~
August 26th, 2002, 10:43 AM
Re: What is honeypot?
Another valuable one....
Doing a search in Google or kartoo.com will turn up enough info...
August 26th, 2002, 02:42 PM
a honeypot is where some 1 puts up like a seperate litlle server to catch an attacker in the act it will log all the activities but give a response to the person (s) attacking the server your computer (EG) u find out you have sub7 running on your computer and you download and install a honeypot when the attacker logs in it will log there IP and the activities which they are doing and thus you have evidence against the attacker to pursue it further (eg) report it to there ISP
By the sacred **** of the sacred psychedelic tibetan yeti ....We\'ll smoke the chinese out
The 20th century pharoes have the slaves demanding work
August 29th, 2002, 07:53 AM
Thnx for your answers. This will help me alot to increase further my knowlegde.
August 29th, 2002, 03:17 PM
Hello there fellow AO cohorts! Top of the morning to ya! I was wondering if anyone here has ever used a honeypot? I think the concept is very cool, but I am wondering how practical it is and under what circumstances you would want to implement it. I appreciate any help.
August 29th, 2002, 05:40 PM
additionally, there are a number of variations from the log-and-respond honeypot. some provide the intellegence to detect anomalies such that new attacks/vulnerabilities can be identified. other's actually attack back.
it's practical when the resources and risk allow for it (just like anything else in security).
it's best implemented along side a h/n ids that can benefit from new signatures learned.
August 29th, 2002, 07:10 PM