Honeypots mailing list archives
RE: Question
From: "Faiz Ahmad Shuja" <faizshuja () yahoo it>
Date: Mon, 18 Aug 2003 21:22:18 +0500
Both of them emulate fake network services. It is just the level of interaction. In a low involvement honeypot, a listener is running on a specific port and logs all the connection requests. Normally it is a one-way communication. Attacker doesn't get a service response from that listener. In a mid involvement honeypot the fake services are more complex. They have knowledge of the service they are listening on. So attacker gets some space to play. Regards, Faiz -----Original Message----- From: Motayyam79 () aol com [mailto:Motayyam79 () aol com] Sent: Monday, August 18, 2003 5:41 PM To: honeypots () securityfocus com Subject: Question hi, I have a query. Can anyone tell me the difference between low interaction honeypots and middle interaction honeypots? I am finding it confusing to distinguish between the two. do they both emulate network services? are they both software running on operating systems? Thanks
Attachment:
smime.p7s
Description:
Current thread:
- Question Motayyam79 (Aug 18)
- Re: Question Richard Stevens (Aug 18)
- Re: Question Lance Spitzner (Aug 18)
- Re: Question Tom Wright (Aug 19)
- RE: Question Faiz Ahmad Shuja (Aug 18)
- <Possible follow-ups>
- question Motayyam79 (Aug 21)
- Re: question Sam Varughese (Aug 21)
- RE: question Faiz Ahmad Shuja (Aug 21)
- RE: question Sergey V. Gordeychik (Aug 21)
- question Motayyam79 (Sep 01)
- Re: question Valdis . Kletnieks (Sep 01)
- RE: question Nick Duda (Sep 01)