|
|
AntiOnline Spotlight: Advanced Web-based Honeypot TechniquesBy Enterprise IT Planet StaffAugust 5, 2005
Google's powerful search algorithms combined with a tenacious crawler have brought many embarrassing vulnerabilities to light. The same technology the masses have embraced to power their research and dig up obscure facts can expose poorly configured servers and IP-enabled devices. As a result, hackers have added to their arsenal a free, easy-to-use tool that scours the Internet for attractive targets. It can be argued that thanks to Google, administrators are starting to think twice about how they lockdown their Web-facing systems. Perhaps, but theres little reason to let the number one search engine, or any hacker widget for that matter, give anyone a glimpse into your network. A new version of the Google Hack Honeypot (GHH) at SourceForge makes it easy for everyone from the Web-server-in-the-basement startup to an IT giant to see how attackers are testing the waters. Deploying a honeypot is a crafty way of observing the enemy. By witnessing the techniques hackers apply in their attempts to sneak into your network, you can make sure that your defenses are up to the task. Honeypots also provide valuable insight into how hackers are adapting their tactics over time a great way to stay one step ahead. After all, if they keep running into the same impenetrable wall, they will quickly search out other ways to get in. Plus, if hackers are wasting their time fruitlessly hacking your honeypot, the less damage theyll do to others. And, of course, its always fun to see them make the wasted effort.
Note: Any opinions expressed below are solely those of the individual posters on the AntiOnline forums. This Week's Spotlight Thread:
Now, onto one of the topics the tutorial covers.
Of course, there's much more. Read the rest of this tutorial here.
|
|