Skip to main content

Securing Your Network From Hackers With HoneyPots?

First thing any hacker would do to compromise any network is gathering information passively and seeking vulnerable services as well as ports. And this is where Honeypots play a role of fake vulnerability in network.
Honeypots are fake theoretically, but not practically. They are real vulnerabilities in Network intentionally kept open & designed to gather information about the possible attack / attacker.



How Honeypots Work?

This fake vulnerability attracts any hacker towards it & he would try to compromise it. The Honeypot will itself stores the data regarding how hacker is trying to break it, what tools he might be using, his intentions, keystrokes and many such things.

This information is useful to network security administrator in many ways. Generally the attack is not done in one shot. Hackers try some initial attacks. And based on its results he hacks into major network flaws after some days.

So Honeypots help security people to secure the networks from the information they have gathered from initial attack. They are called as honey pots only because they are made available in network of vulnerabilities like Honey Comb.

Are Honeypots Vulnerable itself?

Sure they are. There are lot of smart ass hackers – who if anyhow come to know that they are dealing with Honeypots, They can totally screw things up.

Because, they are actually dealing with the system file in the network. So they are already inside it without any breakdown. If they can compromise this fake vulnerability Honeypot i.e. that they can surely break in to the system in less time.

Vulnerability is a vulnerable after all & Honeypots too. But there are very rare chances for attacker to identify it & needs great experience. So, planting Honeypot into any network architecture would be a more secure scenario for any host or network.

Comments

Popular posts from this blog

Adsense Alternatives

Many people have started using Google's AdSense program, but there are some who find it a bit too uncertain or simply not suiting their own requirements from an ad program. But thankfully for such people, there are many alternatives to AdSense which attempt to alleviate some of its shortcomings. Here is a list of the most noteworthy ones from the lot with a description concerning each one. AllFeeds (http://www.allfeeds.com/?action=publishers) AllFeeds has a great pool of online advertisers to choose from. It also features many display formats that you can choose from. These include banners, buttons, XML feeds, DHTML pop-ups and so on. It also features real time reporting of your ad status. The site will mail a check every month, provided that you earn more then $25.00, while rolling over earnings for the next month if you don't. Another interesting thing about AllFeeds is that it integrates with Google AdSense, maximizing your earnings with AdSense. MarketBanker (http://www.mar...

AutoCAD 2011 KeyGen : AutoCAD 2011′s Serial, Activation, License Key, Product Key, Patch

[ How To Use ] Install Autodesk Autocad 2011 Use as Serial 356-72378422 .. or anything matching this template Use as Product Key 001C1 Finish the installation & restart Autodesk Product Before clicking on Activate You have 2 options (Choose option a or b) : - a) Disable Your network Card, pull the network cable out or block with firewall      (this is just to disable online serial check) OR - b) Click on Activate and it will tell you that your serial is wrong, simply click on close et click on activate again. Select “I have an activation code from Autodesk” Once at the activation screen : start XFORCE Keygen 32bits version if you are installing a 32bits application and 64bits if you are installing a 64bits application. Click on Mem Patch (you should see successfully patched) Copy the request code into the keygen and press generate Now copy the activation code back to the activation screen and click Next You have a fully registered autodesk product NO LAME...

How To Hack Gmail Account Password Working 100 Percent

1st.. NOTE: This is for Educational Purpose Only. hackingfreaks.in is not responsible for any damage done by You. Things That you Need for Hacking Gmail Account Password: 1. Gmail Phisher 2. Free Web hosting Site 3. Little bit of manual Work :P Introduction to Phishing:- If you know little bit of Hacking then Its must for you know About Phishing i.e What is Phishing and how it works and most important How you can protect yourself from getting into the Trap. I will try to explain all of these in my article. First of all What are Phish pages and what is phishing?? Phish pages are basically the fake pages or virtual pages that looks similar to the original website Page. The only difference is the batch program running in the background i.e Original Webpage sends requests to Gmail server while Phish Page sends request to hacker’s php server. Now Phishing is a password hacking technique commonly used by hackers using phish pages that looks similar to original web page. The only...