Web Directory

  Honeypots and Honeynets (71)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

See Also - Related Categories
Regular Websites in this category

Honeynet.org: Tracking Botnets Open in a new windowLink Details
- Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.
- http://www.honeynet.org/papers/bots/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Chinese Honeynet Project Open in a new windowLink Details
- The Artemis Project (Chinese Honeynet Project).
- http://www.honeynet.org.cn

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeycomb Open in a new windowLink Details
- A system for automated generation of signatures for network intrusion detection systems (NIDSs).
- http://www.cl.cam.ac.uk/~cpk25/honeycomb/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Deploying and Using Sinkholes Open in a new windowLink Details
- Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
- http://www.arbornetworks.com/dmdocuments/Sinkhole_Tutorial_June03.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Open Proxy Honeypot Open in a new windowLink Details
- Web Application Security Consortium Distributed Open Proxy Honeypot Project.
- http://www.webappsec.org/projects/honeypots/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeyclient Development Project Open in a new windowLink Details
- Honeyclient news, downloads, and information.
- http://www.honeyclient.org/trac

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Microsoft looks to "monkeys" to find Web threats Open in a new windowLink Details
- Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users.
- http://www.securityfocus.com/news/11173

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
French Honeynet Project Open in a new windowLink Details
- The French Honeynet Project is a non-profit, all volunteer group dedicated to honeynet research.
- http://honeynet.rstack.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Know Your Enemy: Learning more about phishing Open in a new windowLink Details
- A detailed analysis of phishing through compromised web servers.
- http://www.honeynet.org/papers/phishing/details/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeyblog Open in a new windowLink Details
- A weblog about with IT-security, honeypots, and honeynets.
- http://honeyblog.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
HoneyC Low-Interaction Client Honeypot Open in a new windowLink Details
- A platform independent low interaction client honeypot that allows identify rogue servers on the web.
- http://honeyc.sourceforge.net

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Bait and Switch Honeypot System Open in a new windowLink Details
- A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
- http://baitnswitch.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
UK Honeynet Project Open in a new windowLink Details
- Provides information surrounding security threats and vulnerabilities active in the wild on UK networks. Home of Honeysnap, tool to analyse Honeywall pcap files and extract summary information.
- http://www.ukhoneynet.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
New Zealand Honeynet project Open in a new windowLink Details
- Papers and information on honeypots, especially application layer, e.g. PHP applications, from the New Zealand branch of the Honeynet project (http://www.honeynet.org/).
- http://www.nz-honeynet.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Medium Interaction Honeypots Open in a new windowLink Details
- Document outlines the weaknesses of different existing approaches to catch malware – especially bots – and shows how Medium Interaction Honeypots solves these problems.
- http://www.pixel-house.net/midinthp.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Nepenthes Open in a new windowLink Details
- A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.
- http://nepenthes.mwcollect.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Portuguese Honeynet Project Open in a new windowLink Details
- Information on their honeypot farm using HoneyMole.
- http://www.honeynet-pt.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Netbait Open in a new windowLink Details
- Netbait Commercial Honeypot.
- http://www.netbaitinc.com

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SécurIT Open in a new windowLink Details
- LogIDS, LogAgent, SécurIT Intrusion Detection Toolkit, and ComLog (a cmd.exe wrapper)
- http://securit.iquebec.com/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Anton Chuvakin Honeynet Reseach and Live Stats Open in a new windowLink Details
- Live honeynet data, papers produced as a result of the honeynet research and other honeypot and honeynet related resources.
- http://www.chuvakin.com/honeynet/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Philippine Honeynet Project, Philippines Open in a new windowLink Details
- Philippine Honeynet Project. Includes transcript of a VMWare Honeynet using Windows XP / Windows 2000 as the base OS.
- http://www.philippinehoneynet.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypots: Tracking Hackers Open in a new windowLink Details
- White papers, mailing list and other resources related to honeypots.
- http://www.tracking-hackers.com/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Strider HoneyMonkey Project Open in a new windowLink Details
- Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
- http://research.microsoft.com/HoneyMonkey/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
KeyFocus - KF Sensor - Honey pot IDS Open in a new windowLink Details
- A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
- http://www.keyfocus.net/kfsensor/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeybee Open in a new windowLink Details
- A tool for semi-automatically creating emulators of network server applications.
- http://www.thomas-apel.de/honeybee/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
mwcollect Open in a new windowLink Details
- A solution to collect worms and other autonomous spreading malware in a non-native environment like FreeBSD or Linux. Some people consider it a next generation honeypot, however computers running mwcollect cannot actually be infected with the malware.
- http://www.mwcollect.org

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Know your Enemy: Phishing Open in a new windowLink Details
- This white paper aims to provide practical information on the practice of phishing and draws on data collected by the German Honeynet Project and UK Honeynet Project.
- http://www.honeynet.org/papers/phishing/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
thp - Tiny Honeypot Open in a new windowLink Details
- A simple honey pot program based on iptables redirects and an xinetd listener.
- http://www.alpinista.org/thp/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Defeating Honeypots: System Issues, Part 1 Open in a new windowLink Details
- This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
- http://www.securityfocus.com/infocus/1826

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
GHH - The "Google Hack" Honeypot Open in a new windowLink Details
- GHH emulates a vulnerable web application by allowing itself to be indexed by search engines. It is hidden from casual page viewers, but is found through the use of a crawler or search engine.
- http://ghh.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypotting: The Complete Documentation Open in a new windowLink Details
- Index of over 75 papers on Honeypots.
- http://l0t3k.org/security/docs/honeypotting/en/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Sombria Honeypot System Open in a new windowLink Details
- A honeypot system and "Honeypot Exchange Program."
- http://www.lac.co.jp/business/sns/intelligence/sombria_e.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeyd Control Center Open in a new windowLink Details
- Honeyd configuration wizard, a SQL Interface, and reports.
- http://zope.org/Members/Ioan/HoneydCenter

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Project Honey Pot: Distributed Spam Harvester Tracking Network Open in a new windowLink Details
- A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.
- http://www.projecthoneypot.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Building a GenII Honeynet Gateway Open in a new windowLink Details
- This is a short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
- http://www.honeynet.org.es/papers/honeywall/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Installing a Virtual Honeywall using VMware Open in a new windowLink Details
- This paper explains how to go about configuring VMware to deploy a Honeywall, combining the advantages offered by the Honeywall CDROM and the virtual environments.
- http://www.honeynet.org.es/papers/vhwall/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Spampoison Open in a new windowLink Details
- Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
- http://www.spampoison.com/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
The Team Cymru Darknet Project Open in a new windowLink Details
- A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
- http://www.cymru.com/Darknet/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Spanish Honeynet Project Open in a new windowLink Details
- Independent non-profit research organization of security professionals dedicated to information security focused on honeynet technologies.
- http://www.honeynet.org.es

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Defeating Honeypots - Network issues, Part 1 Open in a new windowLink Details
- Article discussing methods hackers use to detect honeypots.
- http://www.securityfocus.com/infocus/1803

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
spank Open in a new windowLink Details
- A collection of programs to deploy, run and analyse network and host simulations in IP networks.
- http://spank.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
WebMaven (Buggy Bank) Open in a new windowLink Details
- WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
- http://www.mavensecurity.com/webmaven

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Impost Open in a new windowLink Details
- Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the com
- http://impost.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Basted Open in a new windowLink Details
- A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
- http://basted.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Know Your Enemy: GenII Honeynets Open in a new windowLink Details
- An Introduction to second generation honeynets (honeywalls).
- http://www.honeynet.org/papers/gen2/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeywall CDROM Open in a new windowLink Details
- A honeynet gateway on a bootable CDROM.
- http://www.honeynet.org/tools/cdrom/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
fakeAP Open in a new windowLink Details
- Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
- http://www.blackalchemy.to/project/fakeap/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SCADA HoneyNet Project Open in a new windowLink Details
- SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
- http://scadahoneynet.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeynet Security Console (HSC) Open in a new windowLink Details
- HSC is an analysis tool to view events on your personal honeynet. View and correlate events from Snort, TCPDump, Firewall, Syslog and Sebek logs.
- http://www.activeworx.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeynet.BR Open in a new windowLink Details
- Brazilian Honeypots Alliance. Includes tools to summaries honeyd logs, mydoom.pl (A perl script which emulates the backdoor installed by the Mydoom virus), and an OpenBSD LiveCD Honeypot.
- http://www.honeynet.org.br/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityDocs - Honeypots Open in a new windowLink Details
- Directory of articles, white papers, and documents on honeypots and other security topics.
- http://www.securitydocs.com/Intrusion_Detection/Honeypots

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Wireless Honeypots Open in a new windowLink Details
- Article discussing the use of honeypot technology to combat attacks on wireless networks.
- http://www.securityfocus.com/infocus/1761

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Bubblegum proxypot Open in a new windowLink Details
- An open proxy honeypot (proxypot) that pretends to be an open proxy. Designed primarily to catch the mail spammer.
- http://world.std.com/~pacman/proxypot.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypot + Honeypot = Honeynet Open in a new windowLink Details
- Article discussing the creation of the Honeynet Project.
- http://www.eweek.com/article2/0,4149,1244323,00.asp

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Honeypot Farms Open in a new windowLink Details
- This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms.
- http://www.securityfocus.com/infocus/1720

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
LaBrea Tarpit Open in a new windowLink Details
- A program that creates a tarpit or, as some have called it, a "sticky honeypot".
- http://labrea.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Back Officer Friendly Open in a new windowLink Details
- Created to detect when anyone attempts a Back Orifice scan against your computer. Also detects attempted connections to other services, such as Telnet, FTP, SMTP, POP3 and IMAP2.
- http://www.nfr.com/resource/backOfficer.php

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Talisker Security Wizardry: Honeypots Open in a new windowLink Details
- Describes different commercial and freeware honeypots.
- http://www.securitywizardry.com/honeypots.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Securityfocus: Fighting Spammers With Honeypots Open in a new windowLink Details
- This paper evaluates the usefulness of using honeypots to fight spammers.
- http://www.securityfocus.com/infocus/1747

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypotting with VMware Open in a new windowLink Details
- An article about how to use VMware to produce honeypots to catch system intruders.
- http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypots: Monitoring and Forensics Project Open in a new windowLink Details
- Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics.
- http://honeypots.sourceforge.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Problems and Challenges with Honeypots Open in a new windowLink Details
- Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
- http://www.securityfocus.com/infocus/1757

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
An Evening with Berferd Open in a new windowLink Details
- A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
- http://all.net/books/berferd/berferd.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Honeytokens -The Other Honeypot Open in a new windowLink Details
- This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.
- http://www.securityfocus.com/infocus/1713

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Fighting Internet Worms With Honeypots Open in a new windowLink Details
- This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.
- http://www.securityfocus.com/infocus/1740

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SecurityFocus: Dynamic Honeypots Open in a new windowLink Details
- Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network.
- http://www.securityfocus.com/infocus/1731

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Deception ToolKit (DTK) Open in a new windowLink Details
- A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
- http://all.net/dtk/index.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
SourceForge.net: Project - HoneyView Open in a new windowLink Details
- A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
- http://sourceforge.net/projects/honeyview

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeypots Open in a new windowLink Details
- Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
- http://www.honeypots.net/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Honeyd Open in a new windowLink Details
- Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
- http://www.citi.umich.edu/u/provos/honeyd/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
HoneyNet Project Open in a new windowLink Details
- A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
- http://project.honeynet.org/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]