Honeypots and Honeynets


Address directorium Computers Security

  • An Evening with Berferd A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
  • Anton Chuvakin Honeynet Live honeynet status data, papers produced as a result of research, and other related resources.
  • Basted A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
  • Building a GenII Honeynet Gateway A short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
  • Capture A high interaction client honeypot. A client honeypot is a security technology that allows one to find malicious servers on a network.
  • Deception ToolKit (DTK) A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
  • Deploying and Using Sinkholes Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
  • fakeAP Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
  • Glastopf Honeypot Project Page Glastopf is a small Python webserver which emulates thousands of web application vulnerabilities.
  • Google Hack Honeypot (GHH) Emulates a vulnerable web application by allowing itself to be indexed by search engines. Project information and free download.
  • Honeybee A tool for semi-automatically creating emulators of network server applications.
  • Honeyblog A weblog about with IT-security, honeypots, and honeynets.
  • HoneyBOT A free windows based medium interaction honeypot solution.
  • HoneyC Low-Interaction Client Honeypot A platform independent low interaction client honeypot that allows identify rogue servers on the web.
  • Honeycomb A system for automated generation of signatures for network intrusion detection systems (NIDSs).
  • Honeyd Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
  • Honeyd Control Center Honeyd configuration wizard, a SQL Interface, and reports.
  • HoneyNet Project A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
  • Honeynet.BR Brazilian Honeypots Alliance. Includes tools to summaries honeyd logs, mydoom.pl (A Perl script which emulates the backdoor installed by the Mydoom virus), and an OpenBSD LiveCD Honeypot.
  • Honeypot (computing) - Wikipedia Brief encyclopedia article describing Honeypots.
  • Honeypots Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
  • Honeypots: Monitoring and Forensics Project Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics.
  • Honeypots: Tracking Hackers White papers, mailing list and other resources related to honeypots.
  • Honeypotting: The Complete Documentation Index of over 75 papers on Honeypots.
  • HoneySink: Beta Release | The Honeynet Project HoneySink is an open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network.
  • Honeywall The Honeywall CDROM is a bootable CD that installs onto a hard drive and comes with all the tools and functionality for you to implement data capture, control and analysis.
  • Honeywall CDROM A honeynet gateway on a bootable CDROM.
  • Impost Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the command-line arguments (pre-release version available).
  • KeyFocus - KF Sensor - Honey pot IDS A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
  • kippo - SSH Honeypot - Google Project Hosting A medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
  • Know Your Enemy: GenII Honeynets An Introduction to second generation honeynets (honeywalls).
  • LaBrea Tarpit A program that creates a tarpit or, as some have called it, a "sticky honeypot".
  • Medium Interaction Honeypots Document outlines the weaknesses of different existing approaches to catch malware – especially bots – and shows how Medium Interaction Honeypots solves these problems.
  • MicroSolved, Inc. Seller of HoneyPoint family of products.
  • Nepenthes A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.
  • NoAH European Network of Affiliated Honeypots.
  • Norwegian Honeynet Project Aninternational, non-profit (501c3) research organization dedicated to improving the security of the Internet at no cost to the public.
  • Open Proxy Honeypot Web Application Security Consortium Distributed Open Proxy Honeypot Project.
  • Project Honey Pot: Distributed Spam Harvester Tracking Network A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.
  • SCADA HoneyNet Project SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
  • SecurityFocus: Defeating Honeypots: System Issues, Part 1 This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
  • SourceForge.net: Project - HoneyView A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
  • Spampoison Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
  • Spanish Honeynet Project Independent non-profit research organization of security professionals dedicated to information security focused on honeynet technologies.
  • spank A collection of programs to deploy, run and analyse network and host simulations in IP networks.
  • Talisker Security Wizardry: Honeypots Describes different commercial and freeware honeypots.
  • The Bait and Switch Honeypot System A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
  • The Honeypot Project Watch captured hacks, IP details, How they hacked the honeypot, network owners responses.
  • The Strider HoneyMonkey Project Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
  • The Team Cymru Darknet Project A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
  • Tiny Honeypot (thp) A simple honey pot program based on iptables redirects and an xinetd listener.
  • UK Honeynet Project Provides information surrounding security threats and vulnerabilities active in the wild on UK networks. Home of Honeysnap, tool to analyse Honeywall pcap files and extract summary information.
  • WebMaven (Buggy Bank) WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
  • Wikipedia: Client Honeypot Encyclopedia article about the security devices, including several examples.

Media publications

Mali oglasi

Dragan 065/884-8890
Iskusni bravari rade hale, garaže, panelima leksanom, kao i kapije, ograde, natkrivanje terasa.

Green Smarthaus +381 65 477 5001
Najpovoljnije i najkvalitetnije montažne kuće u Srbiji, uvoz iz Austrije. Eksluzivni najprodavaniji modeli. Proverite sajt www.smarthaus.rs.

Nikolija +49 176 7884 4021
Minhen i okolina - tražim posao čuvanja deteta, ili dece. Imam jako dobro iskustvo, predana sam i pedantna. Za sve dodatne informacije, možete me kontaktirati. Molim, samo ozbiljne ponude.

Jasmina 060/184-9309
Potrebni preprodavci božićnih ježića od žita. Ručni rad, mali su, simpatični, cena je povoljna i postoji mogućnost pristojne zarade pred Novu godinu.

Edo +385 98 265 705
Selidbe i dostave u Evropsku uniju, i iz Evropske unije, vršim povoljno velikim kombijem.

SZR Limaks Beška +381 022 570 799
Proizvodnja i prodaja - kvarcne peći i kaloriferi. Kvarcne grejalice za brzo zagrevanje, sa i bez daske. www.limaks.co.rs


40 korisnika prisutno: 3 registrovanih, 1 skrivenih i 36 senkica. Ulogovani: cesko, galeksic, niko650 (01:08)

Bolje te vidim kad sklopim oči - Milan Višnjić
Uto 16.12.2014 8:31, micha@Umetnost
Jedan od cudnijih snova
Pon 15.12.2014 15:58, jeka1983@Sanovnik forum
Iz moje svaštare
Pon 15.12.2014 12:48, micha@Umetnost
Sanjam stalno bivseg momka. Da li to ista znaci?
Sre 10.12.2014 7:59, danielarmd@Sanovnik forum
Muzicki kutak - pjesme za prijatelje
Sre 10.12.2014 0:11, apprivoiser@Umetnost
Poezija - najlepsi stihovi
Sub 06.12.2014 10:32, Wind@Umetnost
Filigranska kapija od stihova - Dejan Milenković
Sub 06.12.2014 1:28, tragalac@Umetnost
Recepti, jela od mesa - rostiljijada
Sub 06.12.2014 0:45, niko650@Životni stil

Virtuelne razglednice

za rodjendan, godišnjicu braka, srećnu slavu, ženidbu, udaju, položen vozački, prijem u radni odnos...