To Build a Honeypot# Security - 系统安全
z*w
1 楼
To Build A Honeypot
Lance Spitzner
http://www.enteract.com/~lspitz/papers.html
Last Modified: 7 June, 2000
This article is a follow up to the "Know Your Enemy" series.
Many people from the Internet community asked me how I was
able to track black-hats in the act of
probing for and compromising a system. This paper discusses
just that. Here I describe how I built, implemented, and
monitored a honeypot network designed
specifically to learn how black-hats work.
What is a Honeypot?
For me, a hon
Lance Spitzner
http://www.enteract.com/~lspitz/papers.html
Last Modified: 7 June, 2000
This article is a follow up to the "Know Your Enemy" series.
Many people from the Internet community asked me how I was
able to track black-hats in the act of
probing for and compromising a system. This paper discusses
just that. Here I describe how I built, implemented, and
monitored a honeypot network designed
specifically to learn how black-hats work.
What is a Honeypot?
For me, a hon