Summary

skip navigation

honeypots for windows
Chapter 4 - Windows Honeypot Deployment
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

This chapter covered the decisions you need to make in deploying your honeypot and the steps for installing it. The remainder of the chapter described suggestions for hardening honeypots.

You will need to harden any computer hosting VM honeypots. Even Windows honeypots need to be hardened against unauthorized compromise. You can harden a Windows host by installing needed patches, disabling or removing any applications or services not needed by the host, hardening the TCP/IP stack, filtering unneeded network traffic and connections, securing service accounts, protecting user accounts, disabling anonymous enumerations, and enforcing the use of the newer authentication protocols.

Chapter 5 will begin a three-chapter journey through installing, configuring, and using the low-interaction honeypot, Honeyd.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net