fakeAP
Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
Florida Honeynet Project
The Florida Honeynet Project is a not for profit, all volunteer organization dedicated to honeynet research.
GHH - The "Google Hack" Honeypot
GHH emulates a vulnerable web application by allowing itself to be indexed by search engines. It is hidden from casual page viewers, but is found through the use of a crawler or search engine.
Honey Web
An Active Server Pages (ASP) compliant web server honey pot, that detects common attacks against web servers and logs the requests in a real-time viewer . It can recognize Buffer Overflows , Denial of Service attacks, Directory Transversal attacks, SQL Injection attacks , XSS attacks , Session hijacking attacks.
Honeybee
A tool for semi-automatically creating emulators of network server applications.
Honeycomb -- Automated IDS Signature Creation using Honeypots
A system for automated generation of signatures for network intrusion detection systems (NIDSs).
Honeyd
Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
Honeyd - WikiSecure
Wikisecure's honeyd page that describes the basic functionality and operation with self-explanatory examples.
Honeyd Control Center
Honeyd configuration wizard, a SQL Interface, and reports.
HoneyNet Project
A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
Honeynet Security Console (HSC)
HSC is an analysis tool to view events on your personal honeynet. View and correlate events from Snort, TCPDump, Firewall, Syslog and Sebek logs.
Honeynet.BR
Brazilian Honeypots Alliance. Includes tools to summaries honeyd logs, mydoom.pl (A perl script which emulates the backdoor installed by the Mydoom virus), and an OpenBSD LiveCD Honeypot.
Honeynet.org: Tracking Botnets
Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.
Honeypots
Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
Honeypots: Monitoring and Forensics Project
Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics.
Honeypots: Tracking Hackers
White papers, mailing list and other resources related to honeypots.
Honeypotting: The Complete Documentation
Index of over 75 papers on Honeypots.
Honeywall CDROM
A honeynet gateway on a bootable CDROM.
Impost
Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments (pre-release version available).
Installing a Virtual Honeywall using VMware
This paper explains how to go about configuring VMware to deploy a Honeywall, combining the advantages offered by the Honeywall CDROM and the virtual environments.
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next