Honeypots Explained

1 Replies, 865 Views

A Honeypot is a security tool that allows you to attract hackers and people trying to use their scripts and vulnerabilities on your network using “the sweet smell of honey” or at least a digital version of it. It’s a system that appears to be open or at least to have the door cracked just a little bit to entice the bad guys to come in to try and hack around and understand what’s going on but of course it’s a controlled enviourment that you get to see and you get to watch what the bad guys are doing. It’s a great way to gather information on the types of techniques they are using to get into your network and also you to prevent them from going anywhere else in your organization. These days there are no human beings sitting at a keyboard and trying different techniques to try to get through your firewall or try to get to your email server. It’s almost always an automated process it’s a series of scripts it’s a series of applications and programs methodically going through hundreds or maybe even thousands of different techniques to try and get into your server. So if you have a honeypot set up you can see exactly what they are trying you can see the techniques they go through and exactly what they are stepping through to try and break into your systems. You can have honeypots set up as single use traps there just for the moment you built them out for a very specific purpose you can also set up a Honeynet which is an entire series of honeypots

If you want to see what the power of a distributed series of honeypots can do across the entire internet then you want to visit this website
HIDDEN CONTENT
You must reply to this thread to see links.
where people are taking all the information they gather from their honeypot and there all bringing it back to one central location so everyone can learn exactly what’s going on with the internet. It breaks it down even to the ip’s so you can see who is the most suspicious in your country ect... Or state or city, so you can see and block suspicious ip’s in your area or around the world. and you can post your Forensics data that you found on your own honeypot or just check who looks suspicious in your area.
HIDDEN CONTENT
You must reply to this thread to see links.
 
HIDDEN CONTENT
You must reply to this thread to see links.
READ THE RULES OR YOU WILL BE BAN! NO WARNING JUST BAN!
(This post was last modified: 02-09-2013, 05:12 AM by BHS.)
thanks for sharing