a system designed to lure attackers towards it in order to learn about new attacks or to draw attention away from the real system
Questions tagged [honeypot]
135 questions
34
votes
5 answers
Is a honeypot an effective deterrent to hackers successfully compromising your network?
According to Microsoft, adding a honeypot to your corporate network is an effective way to deter hackers from compromising your network.
Aren't honeypots more for research purposes and not ideal for corporate networks?
Wouldn't having a honeypot on…
Jason
- 3,106
- 4
- 22
- 24
25
votes
4 answers
Honeypot on home network to help me learn
I'm a pretty decent (IMO) web app penetration tester, but I'm eager to expand my knowledge of other areas of security. Given that I've just taken on something of an enhanced sysadmin role at my work, I figured it would be a pretty good opportunity…
Chris Allen Lane
- 1,037
- 1
- 10
- 13
18
votes
3 answers
Setting up a honeypot
I have a spare computer lying around at my house, so I decided to turn it into a honeypot. So far, I have installed Windows XP (no service pack) on it and have set up rules on my router to forward (some) ports to the honeypot. Since my router…
ryyst
- 281
- 1
- 2
- 4
8
votes
2 answers
Risks of running Honeypot [specific setup]
I'm planning to run a Honeypot with the following network setup:
In order to avoid the honeypot coming in direct contact with my Internal network, I put it behind a firewall configured on a Linux VM with iptables.
There are the rules:
iptables -P…
Kedar
- 233
- 1
- 6
6
votes
2 answers
Why are honeypots not widely deployed?
From what I understand honeypots in addition to honey tokens are meant to prevent malicious insiders. Given recent high profile cases involving malicious insiders (Snowden), why are honeypots not deployed more frequently? Is it because honeypots are…
mrQWERTY
- 443
- 3
- 7
5
votes
3 answers
Are honeypots successful in preventing attacks?
I've been looking to set up a honeypot, but it seems that honeyd's source code is out of date, and there are few other options.
Which brings me to the question, does anyone employ honeypots as a practice? What software do you use and what options…
Zippy Zeppoli
- 365
- 1
- 2
- 10
4
votes
3 answers
How do I setup honeypot server on Windows 7?
Background
I would like to setup a honeypot server on a Windows 7 PC.
My system is not part of a network and I don't run a server.
I have a Windows 7 desktop PC.
It's Home Premium Anytime Upgrade 32-bit OS and 32-bit PC.
I don't have a wireless…
user31251
- 41
- 1
- 1
- 2
4
votes
1 answer
How do you analyze the data collected from honeypot software?
So you've successfully setup a honeypot. GREAT! Now what?! I've got all this amazing data but;
How do you analyze all the data collected from your honeypot software?
What should you be looking for? (IP addresses, Malware, IRC connections, 0days…
Digital fire
- 3,186
- 5
- 32
- 44
4
votes
2 answers
How relevant is the honeypot technique today?
I have been reading about honeypots and different implementation of them, while some articles are recent most of them are old (more than ten years ago) I was wondering if honeypots are still relevant and used in the industry (used by big companies,…
DrnglVrgs
- 63
- 5
3
votes
1 answer
Is there a Service to setup a Honey Pot URL to collect user IP + other data?
Being the paranoid user I am. I always think I have an infected computer with trojans or malware or prying eyes to my work computer. I was wondering is there a service that lets you create a honey pot URL to collect user's IP + other browser data…
Patoshi パトシ
- 195
- 8
3
votes
2 answers
How could honeypot be vulnerable?
We've been hacked for the 2nd time without knowing how/who did it. Luckily we were able to shutdown everything!
We're trying to deploy Honeypot to be in control of what is going on from our local and global connections. but I've few concerns.
How…
user93097373
- 63
- 1
- 6
3
votes
0 answers
What is the alternative tool for Honeypots?
Nowadays the tools of Honeypots are not reliable as before, because an attacker with some knowledge can detect it and override its power. So if I want something with the same characteristics as the honeypot, what would I use ?
Matheus Gonçalves
- 31
- 2
3
votes
1 answer
How to set up a network for a honeypot?
This is a follow up for How to set up a Virtual Machine for a Honeypot?.
After setting up your Virtual Machine. You need to make sure that your network is properly configured so you don't end up infecting your entire network! So this is a rather…
Digital fire
- 3,186
- 5
- 32
- 44
3
votes
2 answers
How far is honeypot legal?
I have reasons to think that my private message are watched by the site's support that I'm on. This is legal due to the TOS I had to valid when I subscribed to this website.
Howewer, I would like to collect informations about them to prevent any…
Xavier59
- 2,924
- 4
- 18
- 34
3
votes
0 answers
Are there public honeypot logs that I can look at?
Is there a place online where I can see other's honeypot logs and what kind of activities those hackers were up to?
Jason K
- 39
- 1