From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Understand honeypots

Understand honeypots

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Understand honeypots

- [Instructor] One of the techniques that has been used for many years to detect intruders at the perimeter and inside networks is that of honeypots. A honeypot is a target which purports to be a legitimate system, but in fact, it's a lure put in place by a defender to trap an intruder. The objective may be to identify and prosecute, but more often, it's to monitor, and understand the attack techniques, and eventually, discourage them from attacking the site. Honeypots typically come as either low-interaction honeypots which presents a service interface, but have little inside to maintain their pretense as real systems. A high-interaction honeypot, on the other hand, provides a close to real system which tries to keep the attack engaged as long as possible. A honeynet is a network of honeypots purporting to be a complete network environment of real systems. Once an attacker's source address is known, then can be sinkholed where their traffic, and any uploaded malware can be analyzed…

Contents