Honeypots mailing list archives
Re: deceptive content on honeypots
From: Jim Yuill <jimyuill () pobox com>
Date: 2 Apr 2003 18:54:40 -0000
In-Reply-To: <20030331205931.442.qmail () www securityfocus com> I've compiled and organized the SecurityFocus posts related to honeytokens. I found about 30 posts. Any feedback most welcomed, esp. regarding omissions. Thanks to Jose Nazario, et. al, for informing me of the thread. The .doc file is here: http://www.freewebs.com/jimyuill/ Summary: Search terms used on mailing-list archieve: * IDS mailing list: "honeypot" * Honeypot mailing list: "honeytoken" Outline of compilation: 1 Design principles 1.1 General 1.2 Are honeytokens honeypots? 2 Network-based IDS detections 2.1 General 2.2 LDAP example 3 Examples of host-based bait & honeytokens
Current thread:
- Re: deceptive content on honeypots Jeremy Bennett (Mar 31)
- <Possible follow-ups>
- RE: deceptive content on honeypots Richard La Bella (Florida Honeynet) (Apr 01)
- Re: deceptive content on honeypots Jim Yuill (Apr 02)
- Re: deceptive content on honeypots Jim Yuill (Apr 08)
- Re: deceptive content on honeypots Jeremy Bennett (Apr 10)