Chapter 6: Honeyd Configuration

skip navigation

honeypots for windows
Chapter 6 - Honeyd Configuration
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

Overview

Chapter 5 explained how to install Honeyd and its supporting software. In this chapter, you will learn how to configure and implement Honeyd. By the end of this chapter, you should have a working honeypot prepared for intruders to explore.

Honeyd is executed with a handful of runtime command-line options. First, we will review those options, and then we will create a Honeyd.bat batch file to execute Honeyd with some of the typical command-line options. Next, we will create and configure a Honeyd configuration file. Finally, we will test the configuration and runtime operations.

The instructions in this chapter assume that you have correctly configured your network and the Honeyd host PC to pass appropriate traffic to and from the honeypot. Review Chapters 2, 3, and 5, if you need to complete those preparations.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

Similar book on Amazon
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers
Know Your Enemy: Learning about Security Threats (2nd Edition)
Know Your Enemy: Learning about Security Threats (2nd Edition)
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net