Why Use Honeyd?

skip navigation

honeypots for windows
Chapter 5 - Honeyd Installation
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

As you’ll learn soon, Honeyd has a multitude of options, but its plethora of configuration settings can be daunting for the first-time user. However, after you’ve used it a few times, you will understand the basics of how it operates, and find it fun and enjoyable.

I could have chosen an easier to configure honeypot to use in the next few chapters, but I chose Honeyd for the following reasons:

  • Honeyd is the most popular honeypot in use today.

  • It has more features and flexibility than most other honeypots.

  • Installing and configuring Honeyd will increase your understanding of honeypots and how they function.

  • Once you learn Honeyd, you will be able to optimally install and configure most other honeypots.

Honeyd’s strength is its granularity and modular design. You can pick what you want it to do and when. Honeyd administrators modify its configuration as their knowledge matures or their requirements change. Not all honeypots can grow, change, and scale as easily as Honeyd. Many honeypots are stuck mimicking the OSs they were coded to emulate. Other honeypots don’t use emulation and let the host PC be directly attacked and probed.

If you would rather use a very easy to install honeypot, but without the flexibility of Honeyd, consider one of the Windows honeypot programs covered in Chapter 8.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net