Honeypots mailing list archives
Re: how tight should a honeypot be configured?
From: "Earl Sammons" <esammons () hush com>
Date: Wed, 8 Jun 2005 10:42:47 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Carlos, In general, you want to attempt to match the degree of difficulty impossed upon the target (Honeypot) with the capabilities of the subject (Attacker) you are interested in studying. This, of course, does not imply that you should configure _every_ Honeypot you deploy the same way. Earl On Wed, 08 Jun 2005 03:59:42 -0700 Carlos Ousinos <cousinos () ti parmapatas net> wrote:
Hi, I was wondering, what's your opinion on how securely a honeypot should be configured? Should it be really hardened or completely open and vulnerable? Carlos.
-----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkKnMdgACgkQk7+e+4lPSm0RbgCguys+UoNvJFRJyk234J9yUv/p418A oLF1w//BZ7Hj3bigz7a7I/deqnYQ =okaI -----END PGP SIGNATURE-----
Current thread:
- how tight should a honeypot be configured? Carlos Ousinos (Jun 08)
- Re: how tight should a honeypot be configured? Valdis . Kletnieks (Jun 08)
- <Possible follow-ups>
- RE: how tight should a honeypot be configured? Stejerean, Cosmin (Jun 08)
- Re: how tight should a honeypot be configured? Earl Sammons (Jun 08)