G+_Jason Perry Posted April 24, 2017 Share Posted April 24, 2017 Listening to TWiET thinking, how to set up and use a honey pot would be a good security episode when we get further, probably much further, into our networking 101 2 3.... series Link to comment Share on other sites More sharing options...
G+_GeezerGeek Posted April 24, 2017 Share Posted April 24, 2017 I agree. And related to it... it you are using one, how to keep it from being an attractant (indirect exposure) to the rest of your (hidden) infrastructure/system. If I were engaging in intrusion, and found a honeypot ... I would tend to think "okay... that was too easy. What is this trying to distract me from finding?" and then dig deeper. Link to comment Share on other sites More sharing options...
G+_Pat Hacker Posted April 24, 2017 Share Posted April 24, 2017 O Link to comment Share on other sites More sharing options...
G+_Golden Retriever Posted April 25, 2017 Share Posted April 25, 2017 That's only assuming you know who your target is, if you just found that honey pot by scanning you probably have no idea who's system it is, to you it just looks like any other. Link to comment Share on other sites More sharing options...
G+_Jason Perry Posted April 25, 2017 Author Share Posted April 25, 2017 I want to make one to use as a trigger to send me a message to know something made it past my firewall and I need to start reviewing logs and looking closer at devices and traffic. Link to comment Share on other sites More sharing options...
Recommended Posts