-
August 26th, 2002, 09:56 AM
#1
Junior Member
What is honeypot?
sorry to ask u this guys.. i guess this is not a lame question. im a newbie and i dont know what is the meaning of honeypot?
cool_ice^
-
August 26th, 2002, 10:04 AM
#2
Useing google I just did a search for you and found this excelent discription of what a honeypot is
http://www.sans.org/newlook/resource.../honeypot2.htm
In snatches, they learn something of the wisdom
which is of good, and more of the mere knowledge which is of evil. But must I know what must not come, for I shale become those of knowledgedome. Peace~
-
August 26th, 2002, 10:43 AM
#3
Junior Member
Re: What is honeypot?
Another valuable one....
http://project.honeynet.org/
or...
http://www.tracking-hackers.com/
Doing a search in Google or kartoo.com will turn up enough info...
A Bientot
-
August 26th, 2002, 02:42 PM
#4
a honeypot is where some 1 puts up like a seperate litlle server to catch an attacker in the act it will log all the activities but give a response to the person (s) attacking the server your computer (EG) u find out you have sub7 running on your computer and you download and install a honeypot when the attacker logs in it will log there IP and the activities which they are doing and thus you have evidence against the attacker to pursue it further (eg) report it to there ISP
By the sacred **** of the sacred psychedelic tibetan yeti ....We\'ll smoke the chinese out
The 20th century pharoes have the slaves demanding work
http://muaythaiscotland.com/
-
August 29th, 2002, 07:53 AM
#5
Junior Member
Thnx for your answers. This will help me alot to increase further my knowlegde.
cool_ice^
-
August 29th, 2002, 03:17 PM
#6
Honey Pots
Hello there fellow AO cohorts! Top of the morning to ya! I was wondering if anyone here has ever used a honeypot? I think the concept is very cool, but I am wondering how practical it is and under what circumstances you would want to implement it. I appreciate any help.
Thanks.
-
August 29th, 2002, 05:40 PM
#7
Senior Member
additionally, there are a number of variations from the log-and-respond honeypot. some provide the intellegence to detect anomalies such that new attacks/vulnerabilities can be identified. other's actually attack back.
it's practical when the resources and risk allow for it (just like anything else in security).
it's best implemented along side a h/n ids that can benefit from new signatures learned.
-
August 29th, 2002, 07:10 PM
#8
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|