Skip to main content

Questions tagged [honeypot]

a system designed to lure attackers towards it in order to learn about new attacks or to draw attention away from the real system

0 votes
0 answers
100 views

Because the vps where I have installed the t-pot doesn't have any graphic cards (GPU), I must connect to the honeypot through RDP. I connect to the t-pot honeypot directly from my main computer. Are ...
XPDIN's user avatar
  • 113
1 vote
0 answers
61 views

Considering T-Pot System Placement Which are the commands to configure Ubuntu firewall from the terminal, in order for the T-pot to work properly.
XPDIN's user avatar
  • 113
0 votes
2 answers
304 views

I want to collect IoT botnets in order to analyze them. Are there any good VPS providers who allow to do that? - I'm a little cautious about this because of possible misconfigurations that could ...
Jan's user avatar
  • 103
0 votes
1 answer
169 views

I have deployed a low-interaction honeypot on my ec2 aws instance but I am not receiving any traffic. Where can I share the URL so that I can get more traffic especially from automated bots.
cost p's user avatar
  • 1
0 votes
0 answers
135 views

I would like to ask for some tips and your own experience. I want to try build some low-interactive honeypot, but I don't know how many services should I run on it or what is suitable to have on this ...
cipisek's user avatar
  • 182
1 vote
0 answers
34 views

Out of curiosity I want my email address to receive as much spam as possible. For this, I have already set up a virtual machine, with a Postfix that has a catch-all user, so I receive every email to ...
happycoala's user avatar
0 votes
0 answers
171 views

I am trying to set up a honeypot service on the network and I installed dionaea honeypot. I figured out that each service is being controlled by yaml files present in /opt/dionaea/etc/dionaea/services-...
ranjit abraham's user avatar
0 votes
1 answer
219 views

I'm having some issues getting Honeyd to work properly on an external network interface on Ubuntu 20 LTS running on a Proxmox server. I'm fairly sure it's a configuration/setup problem on the VM I'm ...
DavidM's user avatar
  • 1
0 votes
0 answers
182 views

I have read into malware sink holing, as a way to disrupt botnets. There are also approaches to make this more difficult, for example using a Domain Name Generator algorithm which is what the ...
questioner's user avatar
1 vote
1 answer
234 views

I'm thinking through a mischief denial-of-service scenario that seems too easy to employ. Your web-site validates email addresses for new users on sign-up. A rogue party (a competitor) performs sign-...
JimB's user avatar
  • 113
27 votes
6 answers
8k views

Spam is everywhere and everyone gets it (especially professors), but I noticed that my personal email does not get much spam. How can I get more? What are the most common ways of getting spam? Not ...
Marcus's user avatar
  • 1,157
1 vote
2 answers
650 views

I had some difficulty in grasping the concept on how "DNS sinkhole" is being utilize. Is it like setting up something similar to a honeypot to lure attackers away from the actual network, so ...
1g0tquestions's user avatar
0 votes
0 answers
209 views

Question resolved: no reason at this time to assume the remote access was with any malicious intent. [skip this beginning if you want] My partner was offered a job with a real estate listing company ...
Rob Tango's user avatar
0 votes
0 answers
122 views

Is there any pattern or characteristics to identify a kpsensor? It is one of the most used. I have noticed that of the number of supposedly open ports, only those with a real service running respond ...
AnonymousWebHacker's user avatar
1 vote
1 answer
533 views

I though it would be an interesting idea for my final year project. A honeypot token in an image form, with a hidden script that will send you information about the user when the file is executed (...
Urbon's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
10