This is a guest post by BruteForce Lab’s long time supporter and honeypot enthusiast “Black September”. It is also posted on his site here. Honeypots are nothing new, their use pre-dates computers and malware. Their main goal is to passively sit and wait for someone to engage them. The handler (administrator) of the honeypot will …
Tag: HonSSH
Subscribe to BruteForce Lab
BruteForce Lab is accepting donations by grateful users, who think the free software we release has given them a benefit. If you like my security work, a donation would be greatly appreciated!
Popular Posts
Recent Posts
- HNW2015 – Lukas Rist – ICS Honeypot Deployment Strategies and Technologies
- Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets
- IPFS, CoinList, and the Filecoin ICO with Juan Benet and Dalton Caldwell
- New domain
- BSides Lisbon 2016 – MTLS in a Microservices World by Diogo Mónica
Archives
Categories
- Blog News (77)
- Cyber Warfare (7)
- DevOps (5)
- General News (38)
- Honeypots (116)
- Malware (32)
- Network Security (17)
- Programming (11)
- Security Countermeasures (8)
- Security Tools (8)
- Virtualization (15)
- Visualization (62)
- Web Application Security (10)