SecurityDocs - Honeypots
Directory of articles, white papers, and documents on honeypots and other security topics.
SecurityFocus: Defeating Honeypots: System Issues, Part 1
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
SmokeDetector Honeypot
Low-interaction honeypot appliance.
Sombria Honeypot System
A honeypot system and "Honeypot Exchange Program."
SourceForge.net: Project - HoneyView
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
Spampoison
Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
Spanish Honeynet Project
Independent non-profit research organization of security professionals dedicated to information security focused on honeynet technologies.
spank
A collection of programs to deploy, run and analyse network and host simulations in IP networks.
The Strider HoneyMonkey Project
Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
Talisker Honeypots
Web page summarizing different commercial and freeware honeypots.
The Team Cymru Darknet Project
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
thp - Tiny Honeypot
A simple honey pot program based on iptables redirects and an xinetd listener.
Virutal Honeynet: Deploying Honeywall using VMware
Information on deploying a Virtual Honeynet based on Honeywall using VMware.
WebMaven (Buggy Bank)
WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
SecurityFocus: Microsoft looks to "monkeys" to find Web threats
Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users. (May 17, 2005)
Know your Enemy: Phishing
Tracking Botnets with help of Honeynets. (May 16, 2005)
SecurityFocus: Defeating Honeypots - Network issues, Part 1
Article discussing methods hackers use to detect honeypots. (September 28, 2004)
SecurityFocus: Wireless Honeypots
Article discussing the use of honeypot technology to combat attacks on wireless networks. (February 13, 2004)
SecurityFocus: Problems and Challenges with Honeypots
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. (January 14, 2004)
Securityfocus: Fighting Spammers With Honeypots
This paper evaluates the usefulness of using honeypots to fight spammers. (November 26, 2003)
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next