Alkasis Software
Manufacturer of the PatriotBox HoneyPot server.
Back Officer Friendly
Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.
The Bait and Switch Honeypot System
A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
B.A.S.T.E.D.
A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
Bubblegum proxypot
An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch the mail spammer.
Building a GenII Honeynet Gateway
This is a short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
Deception ToolKit (DTK)
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
Deploying and Using Sinkholes
Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
The Distributed Honeypot Project
The goal of this project is to organize dispersed honeypots across the Internet and share findings with the security community.
EruditeAegis.net - Papers on Honeypot technology
Connection Redirection Applied to Production Honeypot.
An Evening with Berferd
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
fakeAP
Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
Florida Honeynet Project
The Florida Honeynet Project is a not for profit, all volunteer organization dedicated to honeynet research.
GHH - The "Google Hack" Honeypot
GHH emulates a vulnerable web application by allowing itself to be indexed by search engines. It is hidden from casual page viewers, but is found through the use of a crawler or search engine.
Honey Web
An Active Server Pages (ASP) compliant web server honey pot, that detects common attacks against web servers and logs the requests in a real-time viewer . It can recognize Buffer Overflows , Denial of Service attacks, Directory Transversal attacks, SQL Injection attacks , XSS attacks , Session hijacking attacks.
Honeybee
A tool for semi-automatically creating emulators of network server applications.
Honeycomb -- Automated IDS Signature Creation using Honeypots
A system for automated generation of signatures for network intrusion detection systems (NIDSs).
Honeyd
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
Honeyd - WikiSecure
Wikisecure's honeyd page that describes the basic functionality and operation with self-explanatory examples.
Honeyd Control Center
Honeyd configuration wizard, a SQL Interface, and reports.
Results: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next