Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Honeypots - A Request filter_list
Author
Message
RE: Honeypots - A Request #11
A UML honeypot (which is text-based) is very easy to detect once you've gained access. But bypassing any honeypot is relative to your knowledge of the underlying system (usually unix but sometimes windows). It's not exactly trivial but it's not impossible to bypass jail-shells. For instance, I've gained root on one or two eepsites on i2p, using a method of jail-breaking via bash.

Once you're out of the initial jail-shell, you can basically juss unset it, or pwn the system entirely. The opposite concept was presented at DefCon 15: how to detect and deny web 2.0 attacks using HoneyJax and IDS's/IPS's.

Symantec has a couple articles about defeating web-based honeypots.
http://www.symantec.com/connect/articles...ues-part-1
[Image: Ov15OiO.png]

Reply





Messages In This Thread
Honeypots - A Request - by Eclipse - 05-30-2014, 07:36 PM
RE: Honeypots - A Request - by Alan Turing - 05-30-2014, 08:41 PM
RE: Honeypots - A Request - by Adorapuff - 05-30-2014, 08:58 PM
RE: Honeypots - A Request - by Eclipse - 05-30-2014, 09:56 PM
RE: Honeypots - A Request - by Alan Turing - 05-30-2014, 11:08 PM
RE: Honeypots - A Request - by Alexaider - 06-14-2014, 01:29 PM
RE: Honeypots - A Request - by ICE_ - 05-31-2014, 05:01 AM
RE: Honeypots - A Request - by superMAUS - 06-02-2014, 12:12 PM
RE: Honeypots - A Request - by Christ - 06-03-2014, 09:26 PM
RE: Honeypots - A Request - by superMAUS - 06-04-2014, 07:11 AM
RE: Honeypots - A Request - by Eclipse - 06-02-2014, 04:27 PM
RE: Honeypots - A Request - by Christ - 06-04-2014, 10:41 AM
RE: Honeypots - A Request - by Eclipse - 06-04-2014, 06:25 PM



Users browsing this thread: 1 Guest(s)