Académique Documents
Professionnel Documents
Culture Documents
Home
AttractingHackersHoneypotsforWindows(BooksforProfessionalsbyProfessionals)
Computers&Technology
Education&Reference
Business&Investing
Science&Math
Search
Category list
Computers & Technology
Attracting Hackers
Share
Grimes R. A.
Hacking
Table of contents
Programming
Invoicing Software
Quickly Create Custom Invoices.
QuickBooks Makes Accounting
Easier!
www.quickbooks.in
Similar pages
Shell VariablesWho Should (and Shouldn t)
Read This BookAssessing Your Requirements:
What Do You Need?7.5 When Should Data
Profiling Be Done?External HackersUsing
Reporting Services Tools to Solve Problems in
Business ScenariosHyperTransport Protocol
ConceptsChapter 12. Vertical Market Search
EnginesRecipe 9.1 Getting and Setting
TimestampsSection 10.4. Date and Time
CalculationsHow Hackers WorkUser
PopulationsWhy Use a Honeypot?Chapter 4:
Windows Honeypot Deployment
You can still set up your IP addressing scheme so that you can easily identify honeypots versus
legitimate assets. For example, in a Class C /24 (255.255.255.0 subnet mask) network, you can
assign honeypots host addresses from .100 to .110 and production servers .1 to .99, or some
similar convention.
You should not name your honeypots something obvious like honeypot1 (dont laugh Ive seen
it done). Its better to follow the same naming scheme as your production computers, but give
your honeypots an identifier that internal staff will recognize.
Some readers may assume that the honeynet should never be on the same subnet as the
production network, but that is not true. If youre trying to protect working assets, you might
want to pepper the production network with your honeypots. We will discuss this further in the
Honeypot System Placement section later in this chapter.
Research Honeypots
Most research honeypots are set up without all of the patches being installed, to give the casual
hacker a hole to break in to. There is no need to constantly upgrade content to match your
production environment. Microsoft may release several patches a week, but there is no burning
need to keep a research honeypot up-to-date. You want the holes. In fact, I dont patch my
Download
unzipper.com/zip
Similar products
http://flylib.com/books/en/1.48.1.20/1/
Malware Analyst's
Cookbook and DVD:
Tools and
Techniques for
Fighting Malicious
Code
Practical Malware
Analysis: The HandsOn Guide to
Dissecting Malicious
Software
1/2
16/09/2016
AttractingHackersHoneypotsforWindows(BooksforProfessionalsbyProfessionals)
Similar pages
Using Moodle
flylib.com Copyright 2008-2013. All Rights Reserved. If you may any questions please contact us: flylib@qtcs.net
http://flylib.com/books/en/1.48.1.20/1/
Privacy policy
2/2