Directory > Computers > Security > Honeypots and Honeynets The Distributed Honeypot Project The goal of this project is to organize dispersed honeypots across the Internet and share findings with the security community. http://www.lucidic.net/ Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Wireless Honeypots Article discussing the use of honeypot technology to combat attacks on wireless networks. http://www.securityfocus.com/infocus/1761 Reviews Rating: Not yet Rated
Whois Check
Bubblegum proxypot An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch the mail spammer. http://world.std.com/~pacman/proxypot.html Reviews Rating: Not yet Rated
Whois Check
The Bait and Switch Honeypot System A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data. http://violating.us/projects/baitnswitch/ Reviews Rating: Not yet Rated
Whois Check
Honeypot + Honeypot = Honeynet Article discussing the creation of the Honeynet Project. http://www.eweek.com/article2/0,4149,1244323,00.asp Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Honeypot Farms This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. http://www.securityfocus.com/infocus/1720 Reviews Rating: Not yet Rated
Whois Check
Tiny Honeypot A very simple honeypot taking up a total of 21k. http://alpinista.dyndns.org/files/thp/ Reviews Rating: Not yet Rated
Whois Check
LaBrea Tarpit A program that creates a tarpit or, as some have called it, a "sticky honeypot". http://labrea.sourceforge.net/ Reviews Rating: Not yet Rated
Whois Check
Back Officer Friendly Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2. http://www.nfr.com/resource/backOfficer.php Reviews Rating: Not yet Rated
Whois Check
Talisker Honeypots Web page summarizing different commercial and freeware honeypots. http://www.securitywizardry.com/honeypots.htm Reviews Rating: Not yet Rated
Whois Check
Securityfocus: Fighting Spammers With Honeypots This paper evaluates the usefulness of using honeypots to fight spammers. http://www.securityfocus.com/infocus/1747 Reviews Rating: Not yet Rated
Whois Check
Deploying and Using Sinkholes Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot. http://www.arbornetworks.com/research_presentations.php Reviews Rating: Not yet Rated
Whois Check
Linux Kernel Patches Kernel logging patches for the honeynet project. http://axehind.com/ Reviews Rating: Not yet Rated
Whois Check
Honeypotting with VMware An article about how to use VMware to produce honeypots to catch system intruders. http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html Reviews Rating: Not yet Rated
Whois Check
Honeypots: Monitoring and Forensics Project Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics. http://honeypots.sourceforge.net/ Reviews Rating: Not yet Rated
Whois Check
RedHat Linux 6.2 Honeypot Analysis Incident analysis for a compromised default honeypot installation of RedHat Linux 6.2. Includes design, configuration and log details for the compromised machine. http://www.holcroft.org/honeypot/ Reviews Rating: Not yet Rated
Whois Check
MastaHackaWannabeAnalajza Provides visualisation of hack attempts against a honeypot server. Reports include attack intensity over time and attack types. Based on IDS data produced by snort. http://rudolf.sytes.net/en/ Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Problems and Challenges with Honeypots Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. http://www.securityfocus.com/infocus/1757 Reviews Rating: Not yet Rated
Whois Check
An Evening with Berferd A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992. http://all.net/books/berferd/berferd.html Reviews Rating: Not yet Rated
Whois Check
Honeypots An introduction to honeypots, the different types, and their value. http://www.tracking-hackers.com/papers/honeypots.html Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Honeytokens -The Other Honeypot This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. http://www.securityfocus.com/infocus/1713 Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Fighting Internet Worms With Honeypots This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. http://www.securityfocus.com/infocus/1740 Reviews Rating: Not yet Rated
Whois Check
SecurityFocus: Dynamic Honeypots Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. http://www.securityfocus.com/infocus/1731 Reviews Rating: Not yet Rated
Whois Check
Deception ToolKit (DTK) A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities. http://all.net/dtk/index.html Reviews Rating: Not yet Rated
Whois Check
SourceForge.net: Project - HoneyView A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data. http://sourceforge.net/projects/honeyview Reviews Rating: Not yet Rated
Whois Check
Honeypots Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues. http://www.honeypots.net/ Reviews Rating: Not yet Rated
Whois Check
Honeypots: Tracking Hackers White papers, mailing list and other resources related to honeypots. http://www.tracking-hackers.com/ Reviews Rating: Not yet Rated
Whois Check
Honeyd Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris. http://www.citi.umich.edu/u/provos/honeyd/ Reviews Rating: Not yet Rated
Whois Check
HoneyNet Project A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned. http://project.honeynet.org/ Reviews Rating: Not yet Rated
Whois Check
|