My Account
Computers Security Honeypots and Honeynets
42

Related categories 2

Live honeynet status data, papers produced as a result of research, and other related resources.
A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
Sink Holes - an ISP Security Tool [pdf]
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
Describing new scheme of password protection called honeywords.
Glastopf is a small Python webserver which emulates thousands of web application vulnerabilities.
Emulates a vulnerable web application by allowing itself to be indexed by search engines. Project information and free download.
A system for automated generation of signatures for network intrusion detection systems (NIDSs).
Honeyd configuration wizard, a SQL Interface, and reports.
Brief encyclopedia article describing Honeypots.
Research paper suggesting a simple method for improving the security of hashed passwords: the maintenance of additional \honeywords" (false passwords) associated with each user's account.
Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments (pre-release version available).
A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
A medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
A program that creates a tarpit or, as some have called it, a "sticky honeypot".
Seller of HoneyPoint family of products.
European Network of Affiliated Honeypots.
Web Application Security Consortium Distributed Open Proxy Honeypot Project.
SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
A collection of programs to deploy, run and analyse network and host simulations in IP networks.
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
A Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents
A simple honey pot program based on iptables redirects and an xinetd listener.
A honeypot for the Windows System with http (web), ftp, tftp, finger, pop3 enabled
Encyclopedia article about the security devices, including several examples.
A series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned. (May 09, 2005)
Article discussing methods hackers use to detect honeypots. (September 28, 2004)
Article discussing the use of honeypot technology to combat attacks on wireless networks. (February 13, 2004)
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. (January 14, 2004)
This paper evaluates the usefulness of using honeypots to fight spammers. (November 26, 2003)
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. (October 23, 2003)
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. (September 15, 2003)
This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. (August 03, 2003)
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. (July 21, 2003)
Article discussing the creation of the Honeynet Project. (September 24, 2001)
A program that creates a tarpit or, as some have called it, a "sticky honeypot".
A simple honey pot program based on iptables redirects and an xinetd listener.
Glastopf is a small Python webserver which emulates thousands of web application vulnerabilities.
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
A medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
A honeypot for the Windows System with http (web), ftp, tftp, finger, pop3 enabled
Describing new scheme of password protection called honeywords.
Research paper suggesting a simple method for improving the security of hashed passwords: the maintenance of additional \honeywords" (false passwords) associated with each user's account.
A Python low-interaction honeyclient aimed at mimicing the behavior of a web browser in order to detect and emulate malicious contents
Sink Holes - an ISP Security Tool [pdf]
Honeyd configuration wizard, a SQL Interface, and reports.
Encyclopedia article about the security devices, including several examples.
Live honeynet status data, papers produced as a result of research, and other related resources.
Brief encyclopedia article describing Honeypots.
Emulates a vulnerable web application by allowing itself to be indexed by search engines. Project information and free download.
A system for automated generation of signatures for network intrusion detection systems (NIDSs).
European Network of Affiliated Honeypots.
Seller of HoneyPoint family of products.
A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
Web Application Security Consortium Distributed Open Proxy Honeypot Project.
A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
A collection of programs to deploy, run and analyse network and host simulations in IP networks.
Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments (pre-release version available).
SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
A series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned. (May 09, 2005)
Article discussing methods hackers use to detect honeypots. (September 28, 2004)
Article discussing the use of honeypot technology to combat attacks on wireless networks. (February 13, 2004)
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker. (January 14, 2004)
This paper evaluates the usefulness of using honeypots to fight spammers. (November 26, 2003)
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks. (October 23, 2003)
Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network. (September 15, 2003)
This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms. (August 03, 2003)
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network. (July 21, 2003)
Article discussing the creation of the Honeynet Project. (September 24, 2001)
Last update:
October 30, 2023 at 5:25:18 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business