PaulDotCom mailing list archives

Deploying Honeypots for Home Network Monitoring


From: infolookup at gmail.com (infolookup at gmail.com)
Date: Tue, 23 Dec 2008 19:52:17 +0000

Thanks everyone for the great input keep them comming. This is the setup
I am thinking about:

Currently I have a FW, I will connect a second FW (Smoothwall or Astaro)from the DMZ interface of the first FW, then 
connect a cisco 2900 switch to an interface on the second FW then connect the Honeypot to that switch.

It would be nice to here how others are setting up there labs.

------Original Message------
From: Aa'ed Alqarta
To: infolookup at gmail.com
To: PaulDotCom Security Weekly Mailing List
Sent: Dec 23, 2008 12:51 PM
Subject: Re: [Pauldotcom] Deploying Honeypots for Home Network Monitoring

I used to NAT all nasty traffic coming to my FW to a box running Nepenthes and monitor it. Running un-patched Windows 
is much better becuase you get the real stuff. Make sure to secure them by a FW or get a separate DSL line. 
 
 
On Tue, Dec 23, 2008 at 4:47 PM, <infolookup at gmail.com <mailto:infolookup at gmail.com> > wrote:
 Hello All:

I have been doing some brief research on Honeypots, and Botnets after looking at my Firewall logs and noticing a few 
specify IP address that try to attack my network around the clock.
 
?This has caused me to look into ?a test environment where I could better monitor these activities.

Any and all suggestions are welcomed.
Sent from my Verizon Wireless BlackBerry
_______________________________________________
 Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com <mailto:Pauldotcom at mail.pauldotcom.com> 
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom 
<http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom> 
 Main Web Site: http://pauldotcom.com <http://pauldotcom.com/> 



-- 
Do It Securely or Not At All

http://extremesecurity.blogspot.com <http://extremesecurity.blogspot.com> 
 

Sent from my Verizon Wireless BlackBerry


Current thread: