A sophisticated device strategically placed on a computer network with the sole purpose of intercepting and capturing malicious network traffic. This tool excels in logging capabilities, surpassing any other network security system, by acquiring comprehensive packet-level data. It even documents the keystrokes and errors made by hackers in their nefarious activities. The captured information holds immense value as it exclusively consists of malicious traffic, offering minimal false positives.
A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the keystrokes and mistakes made by hackers. The captured information is highly valuable as it contains only malicious traffic with little to no false positives.
Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by recording their every move so that the security community can more quickly respond to new exploits.
How does it work?
HoneyBOT works by opening a large range of listening sockets on your computer from which a selection of these sockets are designed to mimic vulnerable services. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment can safely store these files on your computer for malware collection and analysis purposes. Our test server has captured several thousand trojans and rootkits from these simulated services including:
- Dabber
- Devil
- Kuang
- MyDoom
- Netbus
- Sasser
- LSASS
- DCOM (msblast, etc)
- Lithium
- Sub7
Comments