Monday, July 18, 2005
What is a Honeypot
Other than the fact that Winnie the Pooh like to drink honey out of a honey pot, a honeypot in the security world refers to a computer that is setup as a trap for hackers/crackers. It is a computer that is attached to a network with an aim to record the techniques that hackers use to gain unauthorized entry into a network. It acts as a decoy.
Honeypots are designed to capture any activity that happens, so that it can be later played back or analyzed to protect other more valuable machines in the network. Honeypots are used for detection, prevention and also to learn various hacking approaches.
Honeyd is a Honeypot program that creates virtual daemons on a network. The hosts can be configured to run arbitrary services, and their personality can be adapted so that they appear to be running certain operating systems.
So all you budding hackers/crackers out there. Next time you "break" into a system, dont consider that to be something boastworthy. You might have broken into a honeypot and all your activities might have been recorded, without your knowledge.
Honeypots are designed to capture any activity that happens, so that it can be later played back or analyzed to protect other more valuable machines in the network. Honeypots are used for detection, prevention and also to learn various hacking approaches.
Honeyd is a Honeypot program that creates virtual daemons on a network. The hosts can be configured to run arbitrary services, and their personality can be adapted so that they appear to be running certain operating systems.
So all you budding hackers/crackers out there. Next time you "break" into a system, dont consider that to be something boastworthy. You might have broken into a honeypot and all your activities might have been recorded, without your knowledge.
Copyright Anand Jain 2004, 2005. All rights
reserved.
Webmaster