Vous êtes sur la page 1sur 2

16/09/2016

Home

AttractingHackersHoneypotsforWindows(BooksforProfessionalsbyProfessionals)
Computers&Technology

Education&Reference

Business&Investing

Science&Math
Search

Category list
Computers & Technology

Attracting Hackers
Share

Grimes R. A.

Share this on Google+

Business & Culture

Buy on amazon.com >>

Hacking

<< Previous page

Table of contents

Next page >>

Programming

Figure 2-1: Example of a production honeynet


A properly configured production honeynet should be configured identically to the legitimate
assets. The IP address ranges should be identical, and machine names should not deviate
substantially between honeypot and production assets.

Invoicing Software
Quickly Create Custom Invoices.
QuickBooks Makes Accounting
Easier!
www.quickbooks.in

Software Design, Testing & Engineering


Software Development
Software
Security & Encryption
Education & Reference
Arts & Photography

Similar pages
Shell VariablesWho Should (and Shouldn t)
Read This BookAssessing Your Requirements:
What Do You Need?7.5 When Should Data
Profiling Be Done?External HackersUsing
Reporting Services Tools to Solve Problems in
Business ScenariosHyperTransport Protocol
ConceptsChapter 12. Vertical Market Search
EnginesRecipe 9.1 Getting and Setting
TimestampsSection 10.4. Date and Time
CalculationsHow Hackers WorkUser
PopulationsWhy Use a Honeypot?Chapter 4:
Windows Honeypot Deployment

You can still set up your IP addressing scheme so that you can easily identify honeypots versus
legitimate assets. For example, in a Class C /24 (255.255.255.0 subnet mask) network, you can
assign honeypots host addresses from .100 to .110 and production servers .1 to .99, or some
similar convention.
You should not name your honeypots something obvious like honeypot1 (dont laugh Ive seen
it done). Its better to follow the same naming scheme as your production computers, but give
your honeypots an identifier that internal staff will recognize.
Some readers may assume that the honeynet should never be on the same subnet as the
production network, but that is not true. If youre trying to protect working assets, you might
want to pepper the production network with your honeypots. We will discuss this further in the
Honeypot System Placement section later in this chapter.

Research Honeypots
Most research honeypots are set up without all of the patches being installed, to give the casual
hacker a hole to break in to. There is no need to constantly upgrade content to match your
production environment. Microsoft may release several patches a week, but there is no burning
need to keep a research honeypot up-to-date. You want the holes. In fact, I dont patch my

Download
unzipper.com/zip

Zip Or Unzip Any File. Free Download. Unzipper.

Start Download - View PDF


Free Webinar
IoT Developer Program
PMP CerticationTraining
Computer Data Recovery
PG Diploma in Data Science - 11 M Program from Manipal Univ
WBStool
TLV4314 Amplier
Get Paid From Surveys

Similar products

Know Your Enemy:


Virtual Honeypots:
Learning about
From Botnet
Security Threats (2nd Tracking to Intrusion
Edition)
Detection

http://flylib.com/books/en/1.48.1.20/1/

Malware Analyst's
Cookbook and DVD:
Tools and
Techniques for
Fighting Malicious
Code

Practical Malware
Analysis: The HandsOn Guide to
Dissecting Malicious
Software

1/2

16/09/2016

AttractingHackersHoneypotsforWindows(BooksforProfessionalsbyProfessionals)

Similar pages
Using Moodle

Moodle creating lesson

Learn How to Program


Using Any Web Browser

Processing.org checkkey function

JBoss at Work. A Practical


Guide
Jboss log4j apache extra

Killer Game Programming in Halting the Hacker. A


Computer Privacy
Java
Practical Guide to Computer Annoyances
Client/server versus p2p diagram
Online computer worws
Security
Ting the hacker: a practical guide to
computer security ebook

flylib.com Copyright 2008-2013. All Rights Reserved. If you may any questions please contact us: flylib@qtcs.net

http://flylib.com/books/en/1.48.1.20/1/

Privacy policy

2/2

Vous aimerez peut-être aussi