Need to avoid a honeypot? Here’s how
We like honeypots on your internal network – they’re an awesome, cheap way of picking up rogue activity. Why would anyone legitimately be port scanning or attempting to exploit your internal network...
View ArticleCreate a honeynet, dupe your attackers, build threat intelligence
I read Cliff Stoll’s book The Cuckoo’s Egg about his use of honeypots to trap an East German hacker in the 80’s a while back. A fascinating read, I read it in one long sitting, I thoroughly recommend...
View ArticleHoney traps, a lesson in espionage, and managing your ego
We love network honeypots, an awesomely cheap binary IDS. Someone on your network either IS trying to exploit your fake domain controller, or they aren’t. We were running a security awareness training...
View ArticleWork on our honeynet continues apace
A month in, our fake profiles have had significant interest from social networks. Invites have been received and accepted from direct competitors, industry bodies, industry ‘names’ and a fair few...
View ArticleHoneypots; a usage guide
I remember clearly what got me interested in Honeypots. I was an Information Security Analyst and I’d been asked by the Head of IT what a piece of malware actually did, and what kind of threat it...
View ArticleShiva, the spam honeypot. Tips and tricks for getting it up and running.
Following my last honeypot blog post, I’m going to be discussing the email spam honeypot called Shiva. I’m going to walk you through installing and configuring Shiva, including some tips and tricks...
View Article
More Pages to Explore .....