Honeypots mailing list archives

Re: how tight should a honeypot be configured?


From: "Earl Sammons" <esammons () hush com>
Date: Wed, 8 Jun 2005 10:42:47 -0700

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Carlos,

In general, you want to attempt to match the degree of difficulty
impossed upon the target (Honeypot) with the capabilities of the
subject (Attacker) you are interested in studying.  This, of
course, does not imply that you should configure _every_ Honeypot
you deploy the same way.

Earl


On Wed, 08 Jun 2005 03:59:42 -0700 Carlos Ousinos
<cousinos () ti parmapatas net> wrote:
Hi,

I was wondering, what's your opinion on how securely a honeypot
should
be configured?  Should it be really hardened or completely open
and
vulnerable?

Carlos.
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkKnMdgACgkQk7+e+4lPSm0RbgCguys+UoNvJFRJyk234J9yUv/p418A
oLF1w//BZ7Hj3bigz7a7I/deqnYQ
=okaI
-----END PGP SIGNATURE-----



Current thread: