honeynet traps (linux)

Discussion in 'Computers and The Internet' started by Columbo, Nov 19, 2006.

  1. Columbo

    Columbo Senior Member

    Messages:
    1,375
    Likes Received:
    1
    Have any of the more experienced amongst you linux users ever thought of messing with honeypots and setting one up to see if you trap hackers etc and learn more about security?

    You basically set up a server that will look attractive to hackers to learn what they do - but you make it so they can only damage data on that one machine Theyre a good way to learn but you have to be dedicated to build a good one. Security people build them simply to learn about the techniques hackers will use to force their way in and the honeynet community is excellent at helping people track malicious hackers down
    they will leave open various gateways and tools just to see if theyre attracting the right calibre of hacker - the best will suss its a trap soon enough but the dumb ones fall in every time and get their asses burnt off
    ITS WELL FUNNY !
    http://honeynet.org/
    the main object is just to learn more about securing networks so generally they dont do it to burn the hacker unless they try dumb stuff like warning people of the trap ! or if its someone that is known to them and theyve been after before
    This is what a typical honey pot admin will discover and write about
    http://honeynet.thalix.com/scans/scan19/scan/scan19.txt
    Theres a lot more on that page and its very interesting (well to me it is)
    even if you havent got the resources or the inclination to build one - its well worth visiting their site and theyre always willing to help fight hackers and spammers
    http://honeynet.org/

    You can build them for windows too but the majority are linux servers
     
  2. Adderall_Assasin

    Adderall_Assasin Senior Member

    Messages:
    1,266
    Likes Received:
    1
    i have heard of this. my CIS instructor told me that 'sometimes' honeynets are used to convict a known hacker. they are also VERY good for SA's. you can figure out if and who is trying to hack you, and also learn the newest techniques to prevent attacks on imortant systems.

    btw, if you have a windows server, be sure to shut down TCP port 1234. "I AM THE CIA"... no i am not actually the cia, but it is a hack.
     
  3. Columbo

    Columbo Senior Member

    Messages:
    1,375
    Likes Received:
    1
    Unless your running any kind of server software or p2p that has to interface with programs or users over the internet its a good idea to block all inbound ports - just open them as necessary. you will still get a browser to work even with all your inbound ports blocked
    so to start with your ports list would look like this

    1 - 65535 blocked

    but then if you needed to have a port open for a p2p program that connects on port 5465 or whatever your list would read

    1- 5464 blocked
    5465 open
    5466 -65535 blocked
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice