jasminecorp.net directory
Updated Blogs
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Honeypots and Honeynets
Directory > Computers > Security > Honeypots and Honeynets

Web Sitesi

The Distributed Honeypot Project
The goal of this project is to organize dispersed honeypots across the Internet and share findings
with the security community.

http://www.lucidic.net/
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Wireless Honeypots
Article discussing the use of honeypot technology to combat attacks on wireless networks.
http://www.securityfocus.com/infocus/1761
Reviews Rating: Not yet Rated Whois Check

Bubblegum proxypot
An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch
the mail spammer.

http://world.std.com/~pacman/proxypot.html
Reviews Rating: Not yet Rated Whois Check

The Bait and Switch Honeypot System
A system that redirects all hostile traffic from your production systems to a honeypot that is a
partial mirror of your production system. Once switched, the would-be hacker is unknowingly
attacking your honeypot instead of the real data.

http://violating.us/projects/baitnswitch/
Reviews Rating: Not yet Rated Whois Check

Honeypot + Honeypot = Honeynet
Article discussing the creation of the Honeynet Project.
http://www.eweek.com/article2/0,4149,1244323,00.asp
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Honeypot Farms
This article is about deploying and managing honeypots in large, distributed environments through
the use of Honeypot Farms.

http://www.securityfocus.com/infocus/1720
Reviews Rating: Not yet Rated Whois Check

Tiny Honeypot
A very simple honeypot taking up a total of 21k.
http://alpinista.dyndns.org/files/thp/
Reviews Rating: Not yet Rated Whois Check

LaBrea Tarpit
A program that creates a tarpit or, as some have called it, a "sticky honeypot".
http://labrea.sourceforge.net/
Reviews Rating: Not yet Rated Whois Check

Back Officer Friendly
Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects
attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.

http://www.nfr.com/resource/backOfficer.php
Reviews Rating: Not yet Rated Whois Check

Talisker Honeypots
Web page summarizing different commercial and freeware honeypots.
http://www.securitywizardry.com/honeypots.htm
Reviews Rating: Not yet Rated Whois Check

Securityfocus: Fighting Spammers With Honeypots
This paper evaluates the usefulness of using honeypots to fight spammers.
http://www.securityfocus.com/infocus/1747
Reviews Rating: Not yet Rated Whois Check

Deploying and Using Sinkholes
Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
http://www.arbornetworks.com/research_presentations.php
Reviews Rating: Not yet Rated Whois Check

Linux Kernel Patches
Kernel logging patches for the honeynet project.
http://axehind.com/
Reviews Rating: Not yet Rated Whois Check

Honeypotting with VMware
An article about how to use VMware to produce honeypots to catch system intruders.
http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
Reviews Rating: Not yet Rated Whois Check

Honeypots: Monitoring and Forensics Project
Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White
papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot
forensics.

http://honeypots.sourceforge.net/
Reviews Rating: Not yet Rated Whois Check

RedHat Linux 6.2 Honeypot Analysis
Incident analysis for a compromised default honeypot installation of RedHat Linux 6.2. Includes
design, configuration and log details for the compromised machine.

http://www.holcroft.org/honeypot/
Reviews Rating: Not yet Rated Whois Check

MastaHackaWannabeAnalajza
Provides visualisation of hack attempts against a honeypot server. Reports include attack
intensity over time and attack types. Based on IDS data produced by snort.

http://rudolf.sytes.net/en/
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Problems and Challenges with Honeypots
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of
your Honeypot being detected (and potentially abused) by an attacker.

http://www.securityfocus.com/infocus/1757
Reviews Rating: Not yet Rated Whois Check

An Evening with Berferd
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published
in 1992.

http://all.net/books/berferd/berferd.html
Reviews Rating: Not yet Rated Whois Check

Honeypots
An introduction to honeypots, the different types, and their value.
http://www.tracking-hackers.com/papers/honeypots.html
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Honeytokens -The Other Honeypot
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities
that are stored in a restricted part of the network.

http://www.securityfocus.com/infocus/1713
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Fighting Internet Worms With Honeypots
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform
counterattacks.

http://www.securityfocus.com/infocus/1740
Reviews Rating: Not yet Rated Whois Check

SecurityFocus: Dynamic Honeypots
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your
network.

http://www.securityfocus.com/infocus/1731
Reviews Rating: Not yet Rated Whois Check

Deception ToolKit (DTK)
A toolkit designed to make it appear to attackers as if the system running DTK has a large number
of widely known vulnerabilities.

http://all.net/dtk/index.html
Reviews Rating: Not yet Rated Whois Check

SourceForge.net: Project - HoneyView
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results
from queries against the logfile data.

http://sourceforge.net/projects/honeyview
Reviews Rating: Not yet Rated Whois Check

Honeypots
Information covering intrusion detection and prevention systems, research and production honeypots,
and incident handling. Also provides general overview of network security issues.

http://www.honeypots.net/
Reviews Rating: Not yet Rated Whois Check

Honeypots: Tracking Hackers
White papers, mailing list and other resources related to honeypots.
http://www.tracking-hackers.com/
Reviews Rating: Not yet Rated Whois Check

Honeyd
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet,
for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.

http://www.citi.umich.edu/u/provos/honeyd/
Reviews Rating: Not yet Rated Whois Check

HoneyNet Project
A community of organizations actively researching, developing and deploying Honeynets and sharing
the lessons learned.

http://project.honeynet.org/
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia