Home    |Web Directory    |Metasearch    |Message Boards    |Classified Ads|

Web Directory

Home

Web Directory

Metasearch

Message Boards

Classified Ads








Honeypots and Honeynets (71)

See Also:
Sites:

http://all.net/books/berferd/berferd.html
» An Evening with Berferd Open in a new browser window
   A hacker is lured, endured, and studied. One of the first examples of a honeypot. First published in 1992.
   http://all.net/books/berferd/berferd.html
http://www.chuvakin.com/honeynet/
» Anton Chuvakin Honeynet Open in a new browser window
   Live honeynet status data, papers produced as a result of research, and other related resources.
   http://www.chuvakin.com/honeynet/
http://basted.sourceforge.net/
» Basted Open in a new browser window
   A program that acts as a honeypot for spammers who use spambots to harvest email addresses from Web sites.
   http://basted.sourceforge.net/
http://www.honeynet.org.es/papers/honeywall/
» Building a GenII Honeynet Gateway Open in a new browser window
   A short guide to build a GenII Honeynet Gateway, also called a Honeywall, under Linux, broaching the most common problems and providing several solutions and tips.
   http://www.honeynet.org.es/papers/honeywall/
https://projects.honeynet.org/capture-hpc
» Capture Open in a new browser window
   A high interaction client honeypot. A client honeypot is a security technology that allows one to find malicious servers on a network.
   https://projects.honeynet.org/capture-hpc
http://www.honeynet.org.cn
» Chinese Honeynet Project Open in a new browser window
   Artemis Project news, status reports, and papers.
   http://www.honeynet.org.cn
http://en.wikipedia.org/wiki/Client_honeypot_/_honeyclient
» Client honeypot / honeyclient Open in a new browser window
   Wikipedia article on client honeypots.
   http://en.wikipedia.org/wiki/Client_honeypot_/_honeyclient
http://all.net/dtk/index.html
» Deception ToolKit (DTK) Open in a new browser window
   A toolkit designed to make it appear to attackers as if the system running DTK has a large number of widely known vulnerabilities.
   http://all.net/dtk/index.html
http://www.arbornetworks.com/dmdocuments/Sinkhole_Tutorial_June03.pdf
» Deploying and Using Sinkholes Open in a new browser window
   Configuring and deploying Sink Hole Routers, which are the network equivalent of a honey pot.
   http://www.arbornetworks.com/dmdocuments/Sinkhole_Tutorial_June03.pdf
http://sourceforge.net/projects/ghh/
» Google Hack Honeypot (GHH) Open in a new browser window
   Emulates a vulnerable web application by allowing itself to be indexed by search engines. Project information and free download.
   http://sourceforge.net/projects/ghh/
http://www.atomicsoftwaresolutions.com/honeybot.php
» HoneyBOT Open in a new browser window
   A free windows based medium interaction honeypot solution.
   http://www.atomicsoftwaresolutions.com/honeybot.php
https://projects.honeynet.org/honeyc/
» HoneyC Low-Interaction Client Honeypot Open in a new browser window
   A platform independent low interaction client honeypot that allows identify rogue servers on the web.
   https://projects.honeynet.org/honeyc/
http://project.honeynet.org/
» HoneyNet Project Open in a new browser window
   A community of organizations actively researching, developing and deploying Honeynets and sharing the lessons learned.
   http://project.honeynet.org/
http://www.thomas-apel.de/honeybee/
» Honeybee Open in a new browser window
   A tool for semi-automatically creating emulators of network server applications.
   http://www.thomas-apel.de/honeybee/
http://honeyblog.org/
» Honeyblog Open in a new browser window
   A weblog about with IT-security, honeypots, and honeynets.
   http://honeyblog.org/
http://www.honeyclient.org/trac
» Honeyclient Development Project Open in a new browser window
   Honeyclient news, downloads, and information.
   http://www.honeyclient.org/trac
http://www.icir.org/christian/honeycomb/
» Honeycomb Open in a new browser window
   A system for automated generation of signatures for network intrusion detection systems (NIDSs).
   http://www.icir.org/christian/honeycomb/
http://www.citi.umich.edu/u/provos/honeyd/
» Honeyd Open in a new browser window
   Small daemon that creates virtual hosts on a network (honeypot). Can be used as a virtual honeynet, for network monitoring, or as a spam trap. For *BSD, GNU/Linux, and Solaris.
   http://www.citi.umich.edu/u/provos/honeyd/
http://zope.org/Members/Ioan/HoneydCenter
» Honeyd Control Center Open in a new browser window
   Honeyd configuration wizard, a SQL Interface, and reports.
   http://zope.org/Members/Ioan/HoneydCenter
http://www.activeworx.org/
» Honeynet Security Console (HSC) Open in a new browser window
   HSC is an analysis tool to view events on your personal honeynet. View and correlate events from Snort, TCPDump, Firewall, Syslog and Sebek logs.
   http://www.activeworx.org/
http://www.honeynet.org.br/
» Honeynet.BR Open in a new browser window
   Brazilian Honeypots Alliance. Includes tools to summaries honeyd logs, mydoom.pl (A Perl script which emulates the backdoor installed by the Mydoom virus), and an OpenBSD LiveCD Honeypot.
   http://www.honeynet.org.br/
http://www.honeynet.org/papers/bots/
» Honeynet.org: Tracking Botnets Open in a new browser window
   Paper on the use of honeynets to learn more about botnets. Covers uses of botnets, how they work and how to track them.
   http://www.honeynet.org/papers/bots/
http://en.wikipedia.org/wiki/Honeypot_(computing)
» Honeypot (computing) - Wikipedia Open in a new browser window
   Brief encyclopedia article describing Honeypots.
   http://en.wikipedia.org/wiki/Honeypot_(computing)
http://www.eweek.com/c/a/IT-Management/Honeypot-Honeypot-Honeynet/
» Honeypot + Honeypot = Honeynet Open in a new browser window
   Article discussing the creation of the Honeynet Project.
   http://www.eweek.com/c/a/IT-Management/Honeypot-Honeypot-Honeynet/
http://www.honeypots.net/
» Honeypots Open in a new browser window
   Information covering intrusion detection and prevention systems, research and production honeypots, and incident handling. Also provides general overview of network security issues.
   http://www.honeypots.net/
http://honeypots.sourceforge.net/
» Honeypots: Monitoring and Forensics Project Open in a new browser window
   Techniques, tools and resources for conducting Honeypot Research and Forensic Investigation. White papers include monitoring VMware honeypots, apache web server honeypots, and VMware honeypot forensics.
   http://honeypots.sourceforge.net/
http://www.tracking-hackers.com/
» Honeypots: Tracking Hackers Open in a new browser window
   White papers, mailing list and other resources related to honeypots.
   http://www.tracking-hackers.com/
http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
» Honeypotting with VMware Open in a new browser window
   An article about how to use VMware to produce honeypots to catch system intruders.
   http://www.seifried.org/security/ids/20020107-honeypot-vmware-basics.html
http://l0t3k.org/security/docs/honeypotting/en/
» Honeypotting: The Complete Documentation Open in a new browser window
   Index of over 75 papers on Honeypots.
   http://l0t3k.org/security/docs/honeypotting/en/
https://projects.honeynet.org/honeywall
» Honeywall Open in a new browser window
   The Honeywall CDROM is a bootable CD that installs onto a hard drive and comes with all the tools and functionality for you to implement data capture, control and analysis.
   https://projects.honeynet.org/honeywall
http://www.honeynet.org/project/HoneywallCDROM
» Honeywall CDROM Open in a new browser window
   A honeynet gateway on a bootable CDROM.
   http://www.honeynet.org/project/HoneywallCDROM
http://impost.sourceforge.net/
» Impost Open in a new browser window
   Impost can either act as a honey pot and take orders from a Perl script controlling how it responds and communicates with connecting clients; or it can operate as a packet sniffer and monitor incoming data to specified destination port supplied by the com
   http://impost.sourceforge.net/
http://www.keyfocus.net/kfsensor/
» KeyFocus - KF Sensor - Honey pot IDS Open in a new browser window
   A Windows honeypot designed to attract and detect hackers by simulating vulnerable system services and trojans.
   http://www.keyfocus.net/kfsensor/
http://www.honeynet.org/papers/
» Know Your Enemy Open in a new browser window
   A series of white papers describing the concepts and technology of the Honeynet Project and Research Alliance and sharing lessons learned.
   http://www.honeynet.org/papers/
http://www.honeynet.org/papers/gen2/
» Know Your Enemy: GenII Honeynets Open in a new browser window
   An Introduction to second generation honeynets (honeywalls).
   http://www.honeynet.org/papers/gen2/
http://www.honeynet.org/papers/phishing/
» Know your Enemy: Phishing Open in a new browser window
   This white paper aims to provide practical information on the practice of phishing and draws on data collected by the German Honeynet Project and UK Honeynet Project.
   http://www.honeynet.org/papers/phishing/
http://labrea.sourceforge.net/
» LaBrea Tarpit Open in a new browser window
   A program that creates a tarpit or, as some have called it, a "sticky honeypot".
   http://labrea.sourceforge.net/
http://www.honeyclient.org
» MITRE Honeyclient Project Open in a new browser window
   The first open source client honeypot.
   http://www.honeyclient.org
http://www.pixel-house.net/midinthp.pdf
» Medium Interaction Honeypots Open in a new browser window
   Document outlines the weaknesses of different existing approaches to catch malware – especially bots – and shows how Medium Interaction Honeypots solves these problems.
   http://www.pixel-house.net/midinthp.pdf
http://microsolved.com/
» MicroSolved, Inc. Open in a new browser window
   Seller of HoneyPoint family of products.
   http://microsolved.com/
http://www.mwcollect.org
» Nepenthes Open in a new browser window
   A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.
   http://www.mwcollect.org
http://www.fp6-noah.org/
» NoAH Open in a new browser window
   European Network of Affiliated Honeypots.
   http://www.fp6-noah.org/
http://www.honeynor.no/
» Norwegian Honeynet Project Open in a new browser window
   Aninternational, non-profit (501c3) research organization dedicated to improving the security of the Internet at no cost to the public.
   http://www.honeynor.no/
http://www.webappsec.org/projects/honeypots/
» Open Proxy Honeypot Open in a new browser window
   Web Application Security Consortium Distributed Open Proxy Honeypot Project.
   http://www.webappsec.org/projects/honeypots/
http://www.philippinehoneynet.org
» Philippine Honeynet Project, Philippines Open in a new browser window
   Philippine Honeynet Project. Includes transcript of a VMWare Honeynet using Windows XP / Windows 2000 as the base OS.
   http://www.philippinehoneynet.org
http://www.projecthoneypot.org/
» Project Honey Pot: Distributed Spam Harvester Tracking Network Open in a new browser window
   A free, distributed, open-source project to help website administrators track, stop, and prosecute spam harvesters stealing email addresses from their sites.
   http://www.projecthoneypot.org/
http://scadahoneynet.sourceforge.net/
» SCADA HoneyNet Project Open in a new browser window
   SCADA HoneyNet Project: Building Honeypots for Industrial Networks (SCADA, DCS, and PLC architectures).
   http://scadahoneynet.sourceforge.net/
http://www.securitydocs.com/Intrusion_Detection/Honeypots
» SecurityDocs - Honeypots Open in a new browser window
   Directory of articles, white papers, and documents on honeypots and other security topics.
   http://www.securitydocs.com/Intrusion_Detection/Honeypots
http://www.securityfocus.com/infocus/1803
» SecurityFocus: Defeating Honeypots - Network issues, Part 1 Open in a new browser window
   Article discussing methods hackers use to detect honeypots.
   http://www.securityfocus.com/infocus/1803
http://www.securityfocus.com/infocus/1826
» SecurityFocus: Defeating Honeypots: System Issues, Part 1 Open in a new browser window
   This two-part paper discusses how hackers discover, interact with, and sometimes disable honeypots at the system level and the application layer.
   http://www.securityfocus.com/infocus/1826
http://www.securityfocus.com/infocus/1731
» SecurityFocus: Dynamic Honeypots Open in a new browser window
   Honeypots that dynamically learn your network then deploy virtual honeypots that adapt to your network.
   http://www.securityfocus.com/infocus/1731
http://www.securityfocus.com/infocus/1740
» SecurityFocus: Fighting Internet Worms With Honeypots Open in a new browser window
   This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.
   http://www.securityfocus.com/infocus/1740
http://www.securityfocus.com/infocus/1720
» SecurityFocus: Honeypot Farms Open in a new browser window
   This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms.
   http://www.securityfocus.com/infocus/1720
http://www.securityfocus.com/infocus/1713
» SecurityFocus: Honeytokens -The Other Honeypot Open in a new browser window
   This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.
   http://www.securityfocus.com/infocus/1713
http://www.securityfocus.com/news/11173
» SecurityFocus: Microsoft looks to "monkeys" to find Web threats Open in a new browser window
   Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users.
   http://www.securityfocus.com/news/11173
http://www.securityfocus.com/infocus/1757
» SecurityFocus: Problems and Challenges with Honeypots Open in a new browser window
   Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.
   http://www.securityfocus.com/infocus/1757
http://www.securityfocus.com/infocus/1761
» SecurityFocus: Wireless Honeypots Open in a new browser window
   Article discussing the use of honeypot technology to combat attacks on wireless networks.
   http://www.securityfocus.com/infocus/1761
http://www.securityfocus.com/infocus/1747
» Securityfocus: Fighting Spammers With Honeypots Open in a new browser window
   This paper evaluates the usefulness of using honeypots to fight spammers.
   http://www.securityfocus.com/infocus/1747
http://www.lac.co.jp/business/sns/intelligence/sombria_e.html
» Sombria Honeypot System Open in a new browser window
   A honeypot system and "Honeypot Exchange Program."
   http://www.lac.co.jp/business/sns/intelligence/sombria_e.html
http://sourceforge.net/projects/honeyview
» SourceForge.net: Project - HoneyView Open in a new browser window
   A tool to analyze honeyd-logfiles of the honeyd-daemon. Generates graphical and textual results from queries against the logfile data.
   http://sourceforge.net/projects/honeyview
http://www.spampoison.com/
» Spampoison Open in a new browser window
   Website set up to deliver almost infinite numbers of bogus email addresses to email harvesting bots.
   http://www.spampoison.com/
http://www.honeynet.org.es
» Spanish Honeynet Project Open in a new browser window
   Independent non-profit research organization of security professionals dedicated to information security focused on honeynet technologies.
   http://www.honeynet.org.es
http://www.securitywizardry.com/honeypots.htm
» Talisker Security Wizardry: Honeypots Open in a new browser window
   Describes different commercial and freeware honeypots.
   http://www.securitywizardry.com/honeypots.htm
http://baitnswitch.sourceforge.net/
» The Bait and Switch Honeypot System Open in a new browser window
   A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
   http://baitnswitch.sourceforge.net/
http://research.microsoft.com/HoneyMonkey/
» The Strider HoneyMonkey Project Open in a new browser window
   Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
   http://research.microsoft.com/HoneyMonkey/
http://www.cymru.com/Darknet/
» The Team Cymru Darknet Project Open in a new browser window
   A Darknet is a portion of routed, allocated IP space in which no active services or servers seemingly reside. However, there is in fact include at least one server for real-time analysis or post-event network forensics.
   http://www.cymru.com/Darknet/
http://freshmeat.net/projects/thp/
» Tiny Honeypot (thp) Open in a new browser window
   A simple honey pot program based on iptables redirects and an xinetd listener.
   http://freshmeat.net/projects/thp/
http://www.ukhoneynet.org/
» UK Honeynet Project Open in a new browser window
   Provides information surrounding security threats and vulnerabilities active in the wild on UK networks. Home of Honeysnap, tool to analyse Honeywall pcap files and extract summary information.
   http://www.ukhoneynet.org/
http://www.mavensecurity.com/webmaven
» WebMaven (Buggy Bank) Open in a new browser window
   WebMaven is an intentionally broken web application. It is intended to be used in a safe legal environment (your own host) as a training tool, as a basic benchmark platform to test web application security scanners and as a Honeypot.
   http://www.mavensecurity.com/webmaven
http://www.blackalchemy.to/project/fakeap/
» fakeAP Open in a new browser window
   Generates thousands of counterfeit 802.11b access points for use as part of a honeypot or to confuse Wardrivers, NetStumblers, Script Kiddies, and other undesirables.
   http://www.blackalchemy.to/project/fakeap/
http://spank.sourceforge.net/
» spank Open in a new browser window
   A collection of programs to deploy, run and analyse network and host simulations in IP networks.
   http://spank.sourceforge.net/

Category Editor: dgloss

Last Updated: 2007-01-02 19:57:46





Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com

Free previews by Thumbshots.org