Announcement

Collapse
No announcement yet.

Honeypots

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Honeypots

    I'm thinking about installing a Honeypot on my computer.

    If anyone could direct to a good Honeypot, that'd be great!
    -Put up, Or Shut up-

  • #2
    What is a honeypot?

    Comment


    • #3
      Yeah wtf is a honeypot?
      1:Sumpson> SSC wants to be facist

      "The only thing that can ruin this game is the player community." -BD Vine, Sonera
      Corporation.

      Comment


      • #4
        Originally posted by Mr. Peanuts
        What is a honeypot?

        Honeypots - -

        A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource.
        Honeypots are a tremendously simply concept, which gives them some very powerful strengths.

        * Small data sets of high value: Honeypots collect small amounts of information. Instead of logging a one GB of data a day, they can log only one MB of data a day. Instead of generating 10,000 alerts a day, they can generate only 10 alerts a day. Remember, honeypots only capture bad activity, any interaction with a honeypot is most likely unauthorized or malicious activity. As such, honeypots reduce 'noise' by collectin only small data sets, but information of high value, as it is only the bad guys. This means its much easier (and cheaper) to analyze the data a honeypot collects and derive value from it.
        * New tools and tactics: Honeypots are designed to capture anything thrown at them, including tools or tactics never seen before.
        * Minimal resources: Honeypots require minimal resources, they only capture bad activity. This means an old Pentium computer with 128MB of RAM can easily handle an entire class B network sitting off an OC-12 network.
        * Encryption or IPv6: Unlike most security technologies (such as IDS systems) honeypots work fine in encrypted or IPv6 environments. It does not matter what the bad guys throw at a honeypot, the honeypot will detect and capture it.
        * Information: Honeypots can collect in-depth information that few, if any other technologies can match.
        * Simplicty: Finally, honeypots are conceptually very simple. There are no fancy algorithms to develop, state tables to maintain, or signatures to update. The simpler a technology, the less likely there will be mistakes or misconfigurations.

        Kinda like this, a hacker thinks he's actually hacking something when he's not. With a honey pot, you can view his ip, where he's attacking from, with what tool, etc, etc, etc...

        I did find a good Honeypot to use - -
        http://www.keyfocus.net/kfsensor/download/
        You'd be suprised to see people tryin to hack from all tha way across tha world. kewl stuff.
        Last edited by Ice Weasel; 12-21-2004, 06:33 PM.
        -Put up, Or Shut up-

        Comment


        • #5
          http://en.wikipedia.org/wiki/Honeypot

          Comment


          • #6
            Once i broke into a big isp from here using a simple stuff

            i noticed the local operator had crappy netbeui a windows network without password to the hds, rofl. Then i installed some keyloggers on machines and made the antivirus ignore it.

            Got some cool Pw
            8:I Hate Cookies> a gota dágua foi quando falei q eu tinha 38 anos e estava apaixonado por uma garota, mas a família dela n deixava agente namorar
            8:I Hate Cookies> aí quando todo mundo me apoiou falando q o amor supera tudo, falei q a garota tinha 12 anos
            8:I Hate Cookies> aí todos mudaram repentinamente de opinião falando q eu era um pedófilo
            8:AnImoL> esses amigos falsos
            8:SCHOPE NORRIS> o amor supera tudo. da até pra esperar a puberdade
            8:I Hate Cookies> sim... fiquei desiludido schope...

            Comment


            • #7
              I still have no idea what Honeypot is <_<
              I don't know how to put this but I'm kind of a big deal...

              Comment


              • #8
                It basically makes your anti-virus ignore stuff, and concentrate on what could quite probably be a hacker.

                Comment


                • #9
                  Well, not really. It makes a "fake" server setup to lure "hackers" into it to try to hack it, then it logs the attacks that happen. It's basically a trick to see the activities of hackers without any danger (fake server).
                  sdg

                  Comment


                  • #10
                    Ohhhhh.... interesting stuff Ice... :P
                    AcidBomber <ER> ^-^

                    Comment


                    • #11
                      I read something about that somewhere, but a guy networked 4 old rigs and monitored them.

                      Comment


                      • #12
                        In tense.
                        sage

                        Comment

                        Working...
                        X