A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.
Honeypots are a tremendously simply concept, which gives them some very powerful strengths.
* Small data sets of high value: Honeypots collect small amounts of information. Instead of logging a one GB of data a day, they can log only one MB of data a day. Instead of generating 10,000 alerts a day, they can generate only 10 alerts a day. Remember, honeypots only capture bad activity, any interaction with a honeypot is most likely unauthorized or malicious activity. As such, honeypots reduce 'noise' by collectin only small data sets, but information of high value, as it is only the bad guys. This means its much easier (and cheaper) to analyze the data a honeypot collects and derive value from it.
* New tools and tactics: Honeypots are designed to capture anything thrown at them, including tools or tactics never seen before.
* Minimal resources: Honeypots require minimal resources, they only capture bad activity. This means an old Pentium computer with 128MB of RAM can easily handle an entire class B network sitting off an OC-12 network.
* Encryption or IPv6: Unlike most security technologies (such as IDS systems) honeypots work fine in encrypted or IPv6 environments. It does not matter what the bad guys throw at a honeypot, the honeypot will detect and capture it.
* Information: Honeypots can collect in-depth information that few, if any other technologies can match.
* Simplicty: Finally, honeypots are conceptually very simple. There are no fancy algorithms to develop, state tables to maintain, or signatures to update. The simpler a technology, the less likely there will be mistakes or misconfigurations.
Kinda like this, a hacker thinks he's actually hacking something when he's not. With a honey pot, you can view his ip, where he's attacking from, with what tool, etc, etc, etc...
I did find a good Honeypot to use - - http://www.keyfocus.net/kfsensor/download/
You'd be suprised to see people tryin to hack from all tha way across tha world. kewl stuff.
Once i broke into a big isp from here using a simple stuff
i noticed the local operator had crappy netbeui a windows network without password to the hds, rofl. Then i installed some keyloggers on machines and made the antivirus ignore it.
Well, not really. It makes a "fake" server setup to lure "hackers" into it to try to hack it, then it logs the attacks that happen. It's basically a trick to see the activities of hackers without any danger (fake server).
Comment