Quantcast
Channel: Pen Test Partners » Honeypots
Browsing all 6 articles
Browse latest View live

Need to avoid a honeypot? Here’s how

We like honeypots on your internal network – they’re an awesome, cheap way of picking up rogue activity. Why would anyone legitimately be port scanning or attempting to exploit your internal network...

View Article



Create a honeynet, dupe your attackers, build threat intelligence

I read Cliff Stoll’s book The Cuckoo’s Egg about his use of honeypots to trap an East German hacker in the 80’s a while back. A fascinating read, I read it in one long sitting, I thoroughly recommend...

View Article

Honey traps, a lesson in espionage, and managing your ego

We love network honeypots, an awesomely cheap binary IDS. Someone on your network either IS trying to exploit your fake domain controller, or they aren’t. We were running a security awareness training...

View Article

Image may be NSFW.
Clik here to view.

Work on our honeynet continues apace

A month in, our fake profiles have had significant interest from social networks. Invites have been received and accepted from direct competitors, industry bodies, industry ‘names’ and a fair few...

View Article

Image may be NSFW.
Clik here to view.

Honeypots; a usage guide

I remember clearly what got me interested in Honeypots. I was an Information Security Analyst and I’d been asked by the Head of IT what a piece of malware actually did, and what kind of threat it...

View Article


Image may be NSFW.
Clik here to view.

Shiva, the spam honeypot. Tips and tricks for getting it up and running.

Following my last honeypot blog post, I’m going to be discussing the email spam honeypot called Shiva. I’m going to walk you through installing and configuring Shiva, including some tips and tricks...

View Article
Browsing all 6 articles
Browse latest View live




Latest Images