![]() | ![]() |
| ||||||||||
![]() |
![]() |
![]() | |||||
| |||||
![]() |
This chapter first introduced Honeyd and summarized its low-interaction feature set. Honeyd is able to mimic the IP stack personality of hundreds of different OSs. Honeyd needs its own virtual IP network, and it can emulate one host or thousands of hosts. It can emulate any TCP or UDP port number with open, closed, or blocked states with simple port listeners. Port applications can be mimicked by installing service scripts and proxies (and subsystems in the Unix version).
Next, you installed Honeyd. That process actually involved many steps, including downloading and installing other support programs.
Now that you have Honeyd on your computer, your next step is to configure it. Chapter 6 discusses in detail how to configure and use Honeyd.
![]() | |||||
| |||||
![]() |