Honeypots and Honeynets Security Computers


Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.








    Top: Computers: Security: Honeypots and Honeynets

See Also:
  • Honeypots: Tracking Hackers - White papers, mailing list and other resources related computers to honeypots.
  • SecurityFocus: Dynamic Honeypots - Honeypots that dynamically learn your network then deploy security virtual honeypots that adapt to your network.
  • Impost - Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the com
  • Deploying and Using Sinkholes - Configuring and deploying Sink Hole Routers, which are the network honeypots and honeynets equivalent of a honey pot.[PDF]
  • Honeywall - The Honeywall CDROM is a bootable CD that installs onto computers a hard drive and comes with all the tools and computers functionality for you to implement data capture, control and analysis.
  • Sombria Honeypot System - A honeypot system and "Honeypot Exchange Program."
  • LaBrea Tarpit - A program that creates a tarpit or, as security some have called it, a "sticky honeypot".
  • SecurityDocs - Honeypots - Directory of articles, white papers, and documents on honeypots and honeynets honeypots and other security topics.
  • Netbait - Netbait Commercial Honeypot.
  • SCADA HoneyNet Project - SCADA HoneyNet Project: Building Honeypots for Industrial Networks honeypots and honeynets computers (SCADA, DCS, and PLC architectures).
  • Know your Enemy: Phishing - This white paper aims to provide practical information on the security practice of phishing and draws on data collected by the security German Honeynet Project and UK Honeynet Project.
  • SecurityFocus: Defeating Honeypots: System Issues, Part 1 - This two-part paper discusses how hackers discover, interact security with, and computers sometimes disable honeypots at the system security level and the application computers layer.
  • Honeyclient Development Project - Honeyclient news, downloads, and information.
  • thp - Tiny Honeypot - A simple honey pot program based on iptables redirects and computers an xinetd listener.
  • Honeyblog - A weblog about with IT-security, honeypots, and honeynets.
  • Honeyd Control Center - Honeyd configuration wizard, a SQL Interface, and reports.
  • Basted - A program that acts as a honeypot for spammers who security use spambots to harvest email addresses from Web sites.
  • Honeywall CDROM - A honeynet gateway on a bootable CDROM.
  • Open Proxy Honeypot - Web Application Security Consortium Distributed Open Proxy computers Honeypot Project.
  • The Bait and Switch Honeypot System - A system that redirects all hostile traffic from your production security systems to a honeypot that is a partial mirror of security your production system. Once switched, the would-be hacker is security unknowingly attacking your honeypot instead of the real data.
  • Capture - A high interaction client honeypot. A client honeypot security is a computers security technology that allows one to security find malicious servers on computers a network.
  • Honeypotting: The Complete Documentation - Index of over 75 papers on Honeypots.
  • NoAH - European Network of Affiliated Honeypots.
  • The Strider HoneyMonkey Project - Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
  • SecurityFocus: Fighting Internet Worms With Honeypots - This paper evaluates the usefulness of using honeypots computers to fight Internet worms and perform counterattacks.
  • Honeynet.org: Tracking Botnets - Paper on the use of honeynets to learn more about computers botnets. Covers uses of botnets, how they work and how computers to track them.
  • SecurityFocus: Problems and Challenges with Honeypots - Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
  • Chinese Honeynet Project - Artemis Project news, status reports, and papers.
  • Project Honey Pot: Distributed Spam Harvester Tracking Network - A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.
  • fakeAP - Generates thousands of counterfeit 802.11b access points for security use as part of a honeypot or to security confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
  • MicroSolved, Inc. - Seller of HoneyPoint family of products.
  • Deception ToolKit (DTK) - A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
  • HoneyNet Project - A community of organizations actively researching, developing and honeypots and honeynets deploying Honeynets and sharing the lessons learned.
  • Honeycomb - A system for automated generation of signatures for computers network intrusion detection systems (NIDSs).
  • SecurityFocus: Microsoft looks to "monkeys" to find Web threats - Article discussing how Microsoft have developed a series honeypots and honeynets of Windows XP clients, dubbed "honeymonkeys", that crawl honeypots and honeynets the Web finding sites that use unreported vulnerabilities honeypots and honeynets to compromise unsuspecting users.
  • Know Your Enemy: GenII Honeynets - An Introduction to second generation honeynets (honeywalls).
  • Client honeypot / honeyclient - Wikipedia article on client honeypots.
  • Know Your Enemy - A series of white papers describing the concepts and technology computers of the Honeynet Project and Research Alliance and sharing lessons computers learned.
  • HoneyC Low-Interaction Client Honeypot - A platform independent low interaction client honeypot that security allows identify rogue servers on the web.
  • Honeypot + Honeypot = Honeynet - Article discussing the creation of the Honeynet Project.
  • MITRE Honeyclient Project - The first open source client honeypot.
  • Spampoison - Website set up to deliver almost infinite numbers honeypots and honeynets of bogus email addresses to email harvesting bots.
  • Honeynet Security Console (HSC) - HSC is an analysis tool to view events on your computers personal honeynet. View and correlate events from Snort, TCPDump, computers Firewall, Syslog and Sebek logs.
  • SecurityFocus: Honeypot Farms - This article is about deploying and managing honeypots honeypots and honeynets computers in large, distributed environments through the use of honeypots and honeynets computers Honeypot Farms.
  • SecurityFocus: Defeating Honeypots - Network issues, Part 1 - Article discussing methods hackers use to detect honeypots.
  • KeyFocus - KF Sensor - Honey pot IDS - A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
  • An Evening with Berferd - A hacker is lured, endured, and studied. One security of the computers first examples of a honeypot. First security published in 1992.
  • SecurityFocus: Honeytokens -The Other Honeypot - This paper discusses honeytokens, honeypots that are not honeypots and honeynets security computers, but rather digital entities that are stored honeypots and honeynets security in a restricted part of the network.
  • Building a GenII Honeynet Gateway - A short guide to build a GenII Honeynet security Gateway, also called a Honeywall, under Linux, broaching security the most common problems and providing several solutions security and tips.
  • Honeypots - Information covering intrusion detection and prevention systems, research honeypots and honeynets honeypots and honeynets and production honeypots, and incident handling. Also provides honeypots and honeynets honeypots and honeynets general overview of network security issues.
  • SecurityFocus: Wireless Honeypots - Article discussing the use of honeypot technology to combat attacks honeypots and honeynets on wireless networks.
  • Spanish Honeynet Project - Independent non-profit research organization of security professionals dedicated security to information honeypots and honeynets security focused on honeynet technologies.
  • spank - A collection of programs to deploy, run and analyse network and host simulations in IP networks.
  • Anton Chuvakin Honeynet - Live honeynet status data, papers produced as a result of honeypots and honeynets research, and other related resources.
  • Nepenthes - A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.
  • HoneyBOT - A free windows based medium interaction honeypot solution.
  • Honeypot (computing) - Wikipedia - Brief encyclopedia article describing Honeypots.
  • UK Honeynet Project - Provides information surrounding security threats and vulnerabilities active in the computers wild on UK networks. Home of Honeysnap, tool to analyse computers Honeywall pcap files and extract summary information.
  • Honeypots: Monitoring and Forensics Project - Techniques, tools and resources for conducting Honeypot Research security and Forensic honeypots and honeynets Investigation. White papers include monitoring security VMware honeypots, apache web honeypots and honeynets server honeypots, and VMware security honeypot forensics.
  • Honeybee - A tool for semi-automatically creating emulators of network server applications.
  • SourceForge.net: Project - HoneyView - A tool to analyze honeyd-logfiles of the honeyd-daemon. computers Generates security graphical and textual results from queries computers against the logfile data.
  • Honeyd - Small daemon that creates virtual hosts on a honeypots and honeynets network (honeypot). Can be used as a virtual honeypots and honeynets honeynet, for network monitoring, or as a spam honeypots and honeynets trap. For *BSD, GNU/Linux, and Solaris.
  • Securityfocus: Fighting Spammers With Honeypots - This paper evaluates the usefulness of using honeypots security to fight honeypots and honeynets spammers.
  • The Team Cymru Darknet Project - A Darknet is a portion of routed, allocated IP space honeypots and honeynets in which no active services or servers seemingly reside. However, honeypots and honeynets there is in fact include at least one server for honeypots and honeynets real-time analysis or post-event network forensics.
  • Honeynet.BR - Brazilian Honeypots Alliance. Includes tools to summaries honeyd honeypots and honeynets logs, mydoom.pl (A Perl script which emulates the honeypots and honeynets backdoor installed by the Mydoom virus), and an honeypots and honeynets OpenBSD LiveCD Honeypot.
  • Honeypotting with VMware - An article about how to use VMware to security produce honeypots to catch system intruders.
  • Philippine Honeynet Project, Philippines - Philippine Honeynet Project. Includes transcript of a VMWare honeypots and honeynets security Honeynet using Windows XP / Windows 2000 as honeypots and honeynets security the base OS.
  • Medium Interaction Honeypots - Document outlines the weaknesses of different existing approaches honeypots and honeynets to catch malware – especially bots – and honeypots and honeynets shows how Medium Interaction Honeypots solves these honeypots and honeynets problems.[PDF]
  • mwcollect - A solution to collect worms and other autonomous honeypots and honeynets computers spreading malware in a non-native environment like FreeBSD honeypots and honeynets computers or Linux. Some people consider it a honeypots and honeynets computers next generation honeypot, however computers running mwcollect cannot honeypots and honeynets computers actually be infected with the malware.
  • WebMaven (Buggy Bank) - WebMaven is an intentionally broken web application. It is honeypots and honeynets intended to be used in a safe legal environment honeypots and honeynets (your own host) as a training tool, as a basic honeypots and honeynets benchmark platform to test web application security scanners honeypots and honeynets and as a Honeypot.
  • Google Hack Honeypot (GHH) - Emulates a vulnerable web application by allowing itself to be honeypots and honeynets indexed by search engines. Project information and free download.
  • Talisker Security Wizardry: Honeypots - Describes different commercial and freeware honeypots.


   MySQL - Cache Direct


  
Twitter