The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Ten Years of Service
Posts: 150
Threads: 0
RE: Honeypots - A Request 06-04-2014, 10:41 AM
#11
A UML honeypot (which is text-based) is very easy to detect once you've gained access. But bypassing any honeypot is relative to your knowledge of the underlying system (usually unix but sometimes windows). It's not exactly trivial but it's not impossible to bypass jail-shells. For instance, I've gained root on one or two eepsites on i2p, using a method of jail-breaking via bash.
Once you're out of the initial jail-shell, you can basically juss unset it, or pwn the system entirely. The opposite concept was presented at DefCon 15: how to detect and deny web 2.0 attacks using HoneyJax and IDS's/IPS's.
Symantec has a couple articles about defeating web-based honeypots.
http://www.symantec.com/connect/articles...ues-part-1
•
Eleven Years of Service
Posts: 4,274
Threads: 302
RE: Honeypots - A Request 06-04-2014, 06:25 PM
#12
(06-03-2014, 09:26 PM)Christ Wrote: No, s/he is asking for an introduction into honeypots, not criticism.
Edit: fixed accidental subjective pronoun assumption.
Thank you. (He)
(06-04-2014, 07:11 AM)Dr.Jekyll and Mr.Hyde Wrote: No, s/he said s/he wanted to
Not text-based bodyguards.
What? o.O
I worded that wrong, I apologize.
(06-04-2014, 10:41 AM)Christ Wrote: A UML honeypot (which is text-based) is very easy to detect once you've gained access. But bypassing any honeypot is relative to your knowledge of the underlying system (usually unix but sometimes windows). It's not exactly trivial but it's not impossible to bypass jail-shells. For instance, I've gained root on one or two eepsites on i2p, using a method of jail-breaking via bash.
Once you're out of the initial jail-shell, you can basically juss unset it, or pwn the system entirely. The opposite concept was presented at DefCon 15: how to detect and deny web 2.0 attacks using HoneyJax and IDS's/IPS's.
Symantec has a couple articles about defeating web-based honeypots.
http://www.symantec.com/connect/articles...ues-part-1
Thank you, that was enlightening. I'll be sure to read the entire article.
(This post was last modified: 06-04-2014, 07:24 PM by Eclipse.)
•
Ten Years of Service
Posts: 22
Threads: 1
RE: Honeypots - A Request 06-14-2014, 01:29 PM
#13
(05-30-2014, 11:08 PM)Kosaki Wrote: https://www.sinister.ly/Thread-Tutorial-...ng%2bKippo
thnks for the link
"Be careful what you wish for."
•
Users browsing this thread: 1 Guest(s)