Talisker Honeypots
Web page summarizing different commercial and freeware honeypots.
The Team Cymru Darknet Project
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
thp - Tiny Honeypot
A simple honey pot program based on iptables redirects and an xinetd listener.
Virutal Honeynet: Deploying Honeywall using VMware
Information on deploying a Virtual Honeynet based on Honeywall using VMware.
WebMaven (Buggy Bank)
WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
SecurityFocus: Microsoft looks to "monkeys" to find Web threats
Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users. (May 17, 2005)
Know your Enemy: Phishing
Tracking Botnets with help of Honeynets. (May 16, 2005)
SecurityFocus: Defeating Honeypots - Network issues, Part 1
Article discussing methods hackers use to detect honeypots. (September 28, 2004)
SecurityFocus: Wireless Honeypots
Article discussing the use of honeypot technology to combat attacks on wireless networks. (February 13, 2004)
SecurityFocus: Problems and Challenges with Honeypots
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. (January 14, 2004)
Securityfocus: Fighting Spammers With Honeypots
This paper evaluates the usefulness of using honeypots to fight spammers. (November 26, 2003)
SecurityFocus: Fighting Internet Worms With Honeypots
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. (October 23, 2003)
SecurityFocus: Dynamic Honeypots
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. (September 15, 2003)
SecurityFocus: Honeypot Farms
This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. (August 3, 2003)
SecurityFocus: Honeytokens -The Other Honeypot
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. (July 21, 2003)
Honeypots
An introduction to honeypots, the different types, and their value. (May 29, 2003)
Honeypotting with VMware
An article about how to use VMware to produce honeypots to catch system intruders. (February 5, 2002)
Honeypot + Honeypot = Honeynet
Article discussing the creation of the Honeynet Project. (September 24, 2001)
Alkasis Software
Manufacturer of the PatriotBox HoneyPot server.
Back Officer Friendly
Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.
Results: Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next