Start your free trial Book Description "The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time. Ranum "From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all This book really delivers new information and insight about one of the most compelling information security technologies today. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal.
|Published (Last):||25 September 2016|
|PDF File Size:||13.24 Mb|
|ePub File Size:||6.54 Mb|
|Price:||Free* [*Free Regsitration Required]|
Appendix A. Appendix B. Snort Configuration File. Appendix C. IP Protocols. Appendix D. Definitions, Requirements, and Standards Document. Appendix E. Honeynet Logs. A strange IP address was examining an unused service on my system. In this case, a computer based in Korea was attempting to connect to an RPC service on my computer. There is no reason why anyone would want to access this service, especially someone in Korea. Something was definitely up. Immediately following the probe, my Intrusion Detection System screamed an alert, an exploit had just been launched, my system was under assault!
Seconds after the attack an intruder broke into my computer, executed several commands, then took total control of the system. My computer had just been hacked! I was elated, I could not have been happier. Welcome to the exciting world of honeypots where we turn the tables on the badguys. Most of the security books you read today cover a variety of concepts and technologies, almost all are about keeping blackhats out.
This book is different. It is about keeping the badguys in. Traditionally, security has been purely defensive.
There has been little an organization could do to take the initiative, to take the battle to the bad guys. Honeypots change the rules, they are a technology that allows organizations to take the offensive. Honeypots come in a variety of shapes and sizes. Everything from a simple Windows system emulating a few services, to an entire network of productions systems waiting to be hacked. Honeypots also have a variety of values. Everything from a burglar alarm that detects an intruder, to a research tool that can be used to study the motives of the blackhat community.
Honeypots are unique in that they are not a single tool to solve a specific problem. Instead, they are a highly flexible technology that can fulfill a variety of different roles. It is up to you how you want to use and deploy these technologies. In this book, we explain what a honeypot is, how they work, and the different values this unique technology can have. We then go into detail on six different honeypot technologies.
We take you through step-by-step how these honeypot solutions work, their advantages and disadvantages, and what a real attack looks like to each honeypot. Finally, we cover deployment and maintenance issues of honeypots. The goal of this book is to not just give you an understanding of honeypot concepts and architecture, but to give you the skills and experience to deploy the best honeypot solutions for your environment. Throughout the book are examples based on real world experiences, almost all the attacks discussed are based on real world incidents.
You will see the blackhat community at their best, and some at their worst. Best of all, you will arm yourself with the skills and knowledge to track these attackers and learn about them on your own. I have been actively using honeypots for many years. I find them to be absolutely fascinating. They are an exciting technology that not only teaches you a great deal about blackhats, but also a great deal about yourself and security in general.
I hope you enjoy this book as much as I have enjoyed writing and learning about honeypot technologies. Audience This book is intended for the security professional. Anyone involved in protecting or securing computer resources will find this resource valuable.
It is the first publication dedicated to honeypot technologies, a tool that more and more computer security professionals will want to take advantage of once they understand its power and flexibility.
Military organizations can apply these technologies to Cyberwarfare. Universities and security research organizations will find tremendous value in the material concerning research honeypots.
Intelligence organizations can apply this book to intelligence and counter-intelligence activities. Members of law enforcement can use this material for capturing of criminal activities. Legal professionals will find chapter fifteen to be one of the first definitive resources concerning the legal issues of honeypots.
It includes everything from whitepapers and source code to actual evaluation copies of software and data captures of real attacks. This will give you the hands on opportunity to develop your skills with honeypot technologies. Web site This book will have a Web site dedicated to it. The purpose of the Web site is to keep this material updated. If any discrepancies or mistakes are identified in the book, the Web site will have updates and correction. For example, if any of the URLs mentioned in the book have changed or been removed, the Web site will have the latest links.
Also, new technologies are always being developed and deployed. Visit the Web site to stay current with the latest in honeypot technologies. References Each chapter ends with a references section. The purpose is to provide you with resources to gain additional information about topics discussed in the book. Examples of references include Web sites that focus on securing operating systems and books that specialize in forensic analysis.
I sometimes wonder if there are actually two of him. Ideas for cool stuff erupt from him like a volcano and swirl around him, sucking in casual bystanders and students alike. He makes just about everyone else look uninteresting and tepid by comparison. A lot of people like to reserve the term "hacker" for the techno-elite computer hobbyist--those media darlings often described as "misunderstood whiz-kids" or similar nonsense.
Set up your own honeypot or honeynet and see for yourself. This book gives you the necessary tools and concepts to do it! In the past, the hackers roamed our networks with supreme confidence in their anonymity. Sometimes they catch the new tools and are able to reduce their effectiveness in the wild by letting security practitioners quickly react before they become widespread. Right now there are about a half-dozen commercial honeypot products on the market. Lance covers several of them in this book, as well as "homemade" honeypots and honeynets, focusing on how they operate, their value, how to implement them, and their respective advantages.
I predict that within one year, there will be dozens of commercial honeypots. Within two years, there will be a hundred. Honeypots will keep the hackers on their toes and, I predict, will do a lot to shatter their sense of invulnerability. This book is a great place to start learning about the currently available solutions. In this book Lance also tackles the confusion surrounding the legality of honeypots. It may suprise you.
Welcome to the cutting edge of technology, where innovation happens and the law is slow to catch up to new concepts. Meanwhile, you can bet that with renewed concerns about state-sponsored industrial espionage and terrorism the "big boys" will be setting up honeypots of their own. The sheer variety and options for mischief with honeypots are staggering.
There is even a honeypot for spam e-mails. You can use the concepts in this book to deploy just about any kind of honeypot you can imagine. Would you like to build a honeypot for collecting software pirates? How about a honeypot that measures which hacking tools are most popular by tracking hits against an index page?
The possibilities are endless, and I found it difficult to read this book without thinking, "What if. I hope you enjoy this book and I hope it inspires you to exercise your own creativity and learn what the bad guys are up to and then share it with the security community.
Slashdot Top Deals
Appendix A. Appendix B. Snort Configuration File. Appendix C. IP Protocols. Appendix D.
Honeypots: Tracking Hackers
In-depth and structured background on honeypot technology is provided. Honeypots are sorted by the level of interaction with attacker they are able to provide. In addition, the book covers the business benefits of using honeypots. By classifying the value of honeypots into prevention, detection and response exactly as done in Honeynet Project white papers Lance Spitzner analyzes the honeypot technology contributions to an overall security posture.