How Install and setup a honeypot

Honeypot is a computer system set up as a trap for computer attackers. If intruders are always scanning the Internet for potential victims and they are can you find the intruders and their exploits by putting up fake networks that only a deliberate scan could find? That’s the theory behind honeypots. Peter Mikhalenko discusses the implementation, theory, and legality of using a honeypot to protect your network.

ADVERTISEMENTS

From the article:
A honeypot is solution. This is a system designed in such a way that an unsophisticated hacker will want to crack it immediately–like fake diamonds in a glass case in a jewelry shop. First, a quick story. A famous and rich man bought a super safe made of ferro-alloy. He boasted to everyone about his safe and claimed that nobody could crack it. After about a week of this, burglars came in the night and spent two hours cracking the safe with strong acid and explosives. When they opened the safe, they found nothing; the valuables were elsewhere and the burglars were caught.

A honeypot emulates a server with serious security holes. The intent is to attract network intruders so that they will spend their time on a useless job. Honeypots are closely-monitored network decoys that serve several purposes: they can distract adversaries from more valuable machines on a network, provide early warning about new attacks and exploitation trends, and allow in-depth examination of adversaries during and after exploitation.

Read more

🐧 Get the latest tutorials on SysAdmin, Linux/Unix, Open Source & DevOps topics via:
CategoryList of Unix and Linux commands
File Managementcat
FirewallCentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Network Utilitiesdig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg jobs killall kill pidof pstree pwdx time
Searchinggrep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNCentOS 8 Debian 10 Firewall Ubuntu 20.04

ADVERTISEMENTS
6 comments… add one
  • zer0punk Nov 3, 2006 @ 23:14

    What type of honeypot is the most hit? linux or windows?

  • 🐧 nixCraft Nov 4, 2006 @ 3:47

    There is no such hard rule to answer linux or window … it depends upon situation

  • James Apr 27, 2010 @ 4:33

    From where can I get a Honeypot software…including the design,implementation guidelines etc.
    Please help

  • honeypottester Oct 7, 2011 @ 11:58

    windows is an honeypot itself ;=)

  • Raj Jul 30, 2012 @ 14:05

    sir . we take project on implementation of honeyd on linux so , sir can u pls tell me the step to install a honeyd…..

  • yashi Dec 23, 2014 @ 6:13

    sir . we take project on implementation of honeyd on linux so , sir can u pls tell me the step to install a honeyd…..

Leave a Reply

Your email address will not be published. Required fields are marked *

Use HTML <pre>...</pre>, <code>...</code> and <kbd>...</kbd> for code samples.