Honeypots and Honeynets
An Evening with Berferd
A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
Anton Chuvakin Honeynet Reseach and Live Stats
Live honeynet data, papers produced as a result of the honeynet research and other honeypot and honeynet related resources.
B.A.S.T.E.D.
A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
Back Officer Friendly
Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.
Bubblegum proxypot
An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch the mail spammer.
Building a GenII Honeynet Gateway
This is a short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
Deception ToolKit (DTK)
A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
Deploying and Using Sinkholes
Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
EruditeAegis.net - Papers on Honeypot technology
Connection Redirection Applied to Production Honeypot.
GHH - The "Google Hack" Honeypot
GHH emulates a vulnerable web application by allowing itself to be indexed by search engines. It is hidden from casual page viewers, but is found through the use of a crawler or se…
HoneyNet Project
A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
Honeynet Security Console (HSC)
HSC is an analysis tool to view events on your personal honeynet. View and correlate events from Snort, TCPDump, Firewall, Syslog and Sebek logs.
Showing 20–20 of 71 results