Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] Honeypots
- To: <tlug@example.com>
- Subject: Re: [tlug] Honeypots
- From: "Michael ENGEL" <michael-engel@example.com>
- Date: Thu, 11 Apr 2002 17:38:01 +0900
- Content-transfer-encoding: 7bit
- Content-type: text/plain;charset="iso-8859-1"
- References: <13507881ED4DD511B24F00508BB287BF01C7CD42@example.com> <20020307112027.E362@example.com>
An interesting paper on honeypots. The author says "if you have an insecure system it will be compromised", average time (4 honeypots) 1 day of connection before being compromised. Incident Analysis of a Compromised RedHat Linux 6.2 Honeypot Stephen Holcroft, April 2002 http://www.lucidic.net/whitepapers/sholcroft-4.1-2002.html From the author's message to the incidents@example.com mailing list > My Redhat 6.2 server Honeypot was compromised > recently after just 26 minutes of being connected to > the internet, it was used as an IRC proxy for two > hours after being hacked. ----- Original Message ----- > On Thu, Mar 07, 2002 at 10:07:14AM +0800, Mancy, Raymond wrote: > > Hi, > > > > I was wondering if anybody has made one of these before? What OS are you > > running and what services? I know that there are arguments for and against > > them, but it seems like an interesting idea nonetheless. Thats if you have > > the time and the resources....
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] mail recommendations
- Next by Date: Re: [tlug] mail recommendations
- Previous by thread: Re: [tlug] sed and awk
- Next by thread: Re: [tlug] Honeypots
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links