Results 1 to 4 of 4

Thread: Honeyd script and honeypot deployment qwery

  1. #1
    Join Date
    Nov 2010
    Posts
    16

    Honeyd script and honeypot deployment qwery

    hi all you guys please tell me how to deploy this software, ie, pots of honey in Linux or Windows as I had got a dual boot machine with Windows XP. I had read about jars of honey that can be used to control the person you are trying to scan the ports on a network such as LAN and activity that way. my goal is to catch the kids who try to analyze my ports on my LAN,I know how they do, that is, when given lagoon is the other objective is of course the use of these ports honey any suggestions about this or any other better alternative is most welcome on my side

  2. #2
    Join Date
    Jun 2009
    Posts
    1,205

    Re: Honeyd script and honeypot deployment qwery

    A honeypot is a system that simulates the production systems for example, HTTP servers, SMTP servers, a network, etc. The idea is to win the attention of the attackers who, intentionally or not, want to enter the network. Once you can access your network, the honeypot must have mechanisms to record all activities, prevent the attacker to access other systems internal or external and disconnect the attacker, if things get out of control.

  3. #3
    Join Date
    Mar 2009
    Posts
    1,221

    Re: Honeyd script and honeypot deployment qwery

    Joking aside this is a great operating system. I have installed cheese and added to the menu. The only thing keeping this puppy to be the largest operator in the world is an encryption utility class. I would like to encrypt the entire disk, but truecrypt does not allow Linux systems as I have read before. I would like to set up a hidden operating system and a decoy operating system. there are probably not many ways to achieve that but the reality of the matter is i would however love to see this happening.

  4. #4
    Join Date
    May 2008
    Posts
    1,304

    Re: Honeyd script and honeypot deployment qwery

    this is a really good system though I guess Acronis will be able to restore a previously created backup and has the option to do so from a special boot disk, but if you are restoring an encrypted drive and have no access code, I am afraid that will not help much. there are many great features embedded in this operating software still there are many possibilities unexplored and would like to play with this and come to know more about them by myself.

Similar Threads

  1. Build honeypot in my network?
    By Genna in forum Networking & Security
    Replies: 7
    Last Post: 20-06-2011, 10:40 PM
  2. IDS vs Honeypot
    By UselessGuy in forum Networking & Security
    Replies: 5
    Last Post: 16-12-2010, 08:29 AM
  3. How to track hackers in Linux with Honeypot
    By blueprats in forum Guides & Tutorials
    Replies: 2
    Last Post: 21-06-2010, 03:41 PM
  4. What is a term called honeypot
    By CAILYN in forum Networking & Security
    Replies: 5
    Last Post: 21-01-2010, 06:39 AM
  5. Replies: 2
    Last Post: 14-01-2009, 01:25 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,892,538.24018 seconds with 17 queries