thp - Tiny Honeypot
A simple honey pot program based on iptables redirects and an xinetd listener.
Virutal Honeynet: Deploying Honeywall using VMware
Information on deploying a Virtual Honeynet based on Honeywall using VMware.
WebMaven (Buggy Bank)
WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
SecurityFocus: Microsoft looks to "monkeys" to find Web threats
Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users. (May 17, 2005)
Know your Enemy: Phishing
Tracking Botnets with help of Honeynets. (May 16, 2005)
SecurityFocus: Defeating Honeypots - Network issues, Part 1
Article discussing methods hackers use to detect honeypots. (September 28, 2004)
SecurityFocus: Wireless Honeypots
Article discussing the use of honeypot technology to combat attacks on wireless networks. (February 13, 2004)
SecurityFocus: Problems and Challenges with Honeypots
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. (January 14, 2004)
Securityfocus: Fighting Spammers With Honeypots
This paper evaluates the usefulness of using honeypots to fight spammers. (November 26, 2003)
SecurityFocus: Fighting Internet Worms With Honeypots
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. (October 23, 2003)
SecurityFocus: Dynamic Honeypots
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. (September 15, 2003)
SecurityFocus: Honeypot Farms
This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. (August 3, 2003)
SecurityFocus: Honeytokens -The Other Honeypot
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. (July 21, 2003)
Honeypots
An introduction to honeypots, the different types, and their value. (May 29, 2003)
Honeypotting with VMware
An article about how to use VMware to produce honeypots to catch system intruders. (February 5, 2002)
Honeypot + Honeypot = Honeynet
Article discussing the creation of the Honeynet Project. (September 24, 2001)
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15