Privacy Policy
Contact Us
  Search Home : Computers : Security : Honeypots and Honeynets

See Also:

  • Alkasis Software: Manufacturer of the PatriotBox HoneyPot server.
  • An Evening with Berferd: A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
  • B.A.S.T.E.D.: A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
  • Back Officer Friendly: Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.
  • Bubblegum proxypot: An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch the mail spammer.
  • Building a GenII Honeynet Gateway: This is a short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
  • Deception ToolKit (DTK): A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
  • Deploying and Using Sinkholes: Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
  • - Papers on Honeypot technology: Connection Redirection Applied to Production Honeypot.
  • Florida Honeynet Project: The Florida Honeynet Project is a not for profit, all volunteer organization dedicated to honeynet research.
  • Honey Web: An Active Server Pages (ASP) compliant web server honey pot, that detects common attacks against web servers and logs the requests in a real-time viewer . It can recognize Buffer Overflows , Denial of Service attacks, Directory Transversal attacks, SQL Injection attacks , XSS attacks , Session hijacking attacks.
  • HoneyNet Project: A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
  • Honeycomb -- Automated IDS Signature Creation using Honeypots: A system for automated generation of signatures for network intrusion detection systems (NIDSs).
  • Honeyd: Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
  • Honeyd Control Center: Honeyd configuration wizard, a SQL Interface, and reports.
  • Honeynet Security Console (HSC): HSC is an analysis tool to view events on your personal honeynet. View and correlate events from Snort, TCPDump, Firewall, Syslog and Sebek logs.
  • Honeynet.BR: Brazilian Honeypots Alliance. Includes tools to summaries honeyd logs, (A perl script which emulates the backdoor installed by the Mydoom virus), and an OpenBSD LiveCD Honeypot.
  • Honeypot + Honeypot = Honeynet: Article discussing the creation of the Honeynet Project.
  • Honeypots: An introduction to honeypots, the different types, and their value.
  • Honeypots: Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
  • Honeypots: Monitoring and Forensics Project: Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics.
  • Honeypots: Tracking Hackers: White papers, mailing list and other resources related to honeypots.
  • Honeypotting with VMware: An article about how to use VMware to produce honeypots to catch system intruders.
  • Honeypotting: The Complete Documentation: Index of over 75 papers on Honeypots.
  • Honeywall CDROM: A honeynet gateway on a bootable CDROM.
  • Impost: Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments (pre-release version available).
  • Installing a Virtual Honeywall using VMware: This paper explains how to go about configuring VMware to deploy a Honeywall, combining the advantages offered by the Honeywall CDROM and the virtual environments.
  • Jackpot Mailswerver: A ready-to-run SMTP relay honeypot, written in pure Java.
  • Know Your Enemy: GenII Honeynets: An Introduction to second generation honeynets (honeywalls).
  • LaBrea Tarpit: A program that creates a tarpit or, as some have called it, a "sticky honeypot".
  • Linux Kernel Patches: Kernel logging patches for the honeynet project.
  • MastaHackaWannabeAnalajza: Provides visualization of hack attempts against a honeypot server. Reports include attack intensity over time and attack types. Based on IDS data produced by snort.
  • Project Honey Pot: Distributed Spam Harvester Tracking Network: A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.
  • RedHat Linux 6.2 Honeypot Analysis: Incident analysis for a compromised default honeypot installation of RedHat Linux 6.2. Includes design, configuration and log details for the compromised machine.
  • SCADA HoneyNet Project: SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
  • SecurityDocs - Honeypots: Directory of articles, white papers, and documents on honeypots and other security topics.
  • SecurityFocus: Problems and Challenges with Honeypots: Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
  • SecurityFocus: Defeating Honeypots - Network issues, Part 1: Article discussing methods hackers use to detect honeypots.
  • SecurityFocus: Dynamic Honeypots: Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network.
  • SecurityFocus: Fighting Internet Worms With Honeypots: This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.
  • SecurityFocus: Honeypot Farms: This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms.
  • SecurityFocus: Honeytokens -The Other Honeypot: This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.
  • SecurityFocus: Wireless Honeypots: Article discussing the use of honeypot technology to combat attacks on wireless networks.
  • Securityfocus: Fighting Spammers With Honeypots: This paper evaluates the usefulness of using honeypots to fight spammers.
  • SmokeDetector Honeypot: Low-interaction honeypot appliance.
  • Sombria Honeypot System: A honeypot system and "Honeypot Exchange Program."
  • Project - HoneyView: A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
  • Spampoison: Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
  • Spanish Honeynet Project: Independent non-profit research organization of security professionals dedicated to information security focused on honeynet technologies.
  • SécurIT: LogIDS, LogAgent, SécurIT Intrusion Detection Toolkit, and ComLog (a cmd.exe wrapper)
  • Talisker Honeypots: Web page summarizing different commercial and freeware honeypots.
  • The Bait and Switch Honeypot System: A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
  • The Distributed Honeypot Project: The goal of this project is to organize dispersed honeypots across the Internet and share findings with the security community.
  • The Team Cymru Darknet Project: A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
  • Virutal Honeynet: Deploying Honeywall using VMware: Information on deploying a Virtual Honeynet based on Honeywall using VMware.
  • WebMaven (Buggy Bank): WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
  • fakeAP: Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
  • spank: A collection of programs to deploy, run and analyse network and host simulations in IP networks.


Custom Search
Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Copyright 2005-2019 All rights reserved, AllSites, LLC