Enter Domain Name:

Top / Computers / Security / Honeypots_and_Honeynets /

The Strider HoneyMonkey Project
Microsoft Research project to detect and analyze Web sites hosting malicious code using client-side honeypots.
http://research.microsoft.com/HoneyMonkey/
Microsoft.com  ~   Site Info   Whois   Trace Route   RBL Check  
Honeypots: Tracking Hackers
White papers, mailing list and other resources related to honeypots.
http://www.tracking-hackers.com/
Tracking-hackers.com  ~   Site Info   Whois   Trace Route   RBL Check  
Philippine Honeynet Project, Philippines
Philippine Honeynet Project. Includes transcript of a VMWare Honeynet using Windows XP / Windows 2000 as the base OS.
http://www.philippinehoneynet.org
Philippinehoneynet.org  ~   Site Info   Whois   Trace Route   RBL Check  
Anton Chuvakin Honeynet
Live honeynet status data, papers produced as a result of research, and other related resources.
http://www.chuvakin.com/honeynet/
Chuvakin.com  ~   Site Info   Whois   Trace Route   RBL Check  
Netbait
Netbait Commercial Honeypot.
http://www.netbaitinc.com
Netbaitinc.com  ~   Site Info   Whois   Trace Route   RBL Check  
Nepenthes
A low interaction honeypot designed to emulate vulnerabilties worms use to spread, and to capture these worms.
http://nepenthes.mwcollect.org/
Mwcollect.org  ~   Site Info   Whois   Trace Route   RBL Check  
Medium Interaction Honeypots
Document outlines the weaknesses of different existing approaches to catch malware – especially bots – and shows how Medium Interaction Honeypots solves these problems.
http://www.pixel-house.net/midinthp.pdf
Pixel-house.net  ~   Site Info   Whois   Trace Route   RBL Check  
UK Honeynet Project
Provides information surrounding security threats and vulnerabilities active in the wild on UK networks. Home of Honeysnap, tool to analyse Honeywall pcap files and extract summary information.
http://www.ukhoneynet.org/
Ukhoneynet.org  ~   Site Info   Whois   Trace Route   RBL Check  
The Bait and Switch Honeypot System
A system that redirects all hostile traffic from your production systems to a honeypot that is a partial mirror of your production system. Once switched, the would-be hacker is unknowingly attacking your honeypot instead of the real data.
http://baitnswitch.sourceforge.net/
Sourceforge.net  ~   Site Info   Whois   Trace Route   RBL Check  
Honeyblog
A weblog about with IT-security, honeypots, and honeynets.
http://honeyblog.org/
Honeyblog.org  ~   Site Info   Whois   Trace Route   RBL Check  
 


Page 5/8« Previous34567Next »