Honeypot Run

1 year ago
18

Honeypot technology is essentially a technique to deceive the attacker by arranging some hosts, network services or information as decoys to induce the attacker to carry out attacks on them, so that the attack behavior can be captured and analyzed, the tools and methods used by the attacker can be understood, and the intention and motivation of the attack can be inferred, enabling the defender to clearly understand the security threat they are facing, and to enhance the actual system security protection through technical and management tools to enhance the security of the actual system.
Honeypots are like intelligence gathering systems. A honeypot seems like a deliberate target for someone to attack, luring hackers to attack. So after an attacker has compromised, you can know how he got his way and stay up to date on the latest attacks and vulnerabilities launched against the server. You can also collect all the tools used by hackers by eavesdropping on their contacts with each other, and keep track of their social networks.

Loading comments...