GHH emulates a vulnerable web application by allowing itself to be indexed by search engines. It is hidden from casual page viewers, but is found through the use of a crawler or search engine.
Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.
This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
A simple honey pot program based on iptables redirects and an xinetd listener.
This white paper aims to provide practical information on the practice of phishing and draws on data collected by the German Honeynet Project and UK Honeynet Project.
Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users.
A solution to collect worms and other autonomous spreading malware in a non-native environment like FreeBSD or Linux. Some people consider it a next generation honeypot, however computers running mwcollect cannot actually be infected with the malware.
A tool for semi-automatically creating emulators of network server applications.
A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
Computers /
Security /
Internet /
Research
|