An Overview of Six Honeypots

In the next six chapters, we will examine in detail six specific honeypots, all with different levels of interaction. The goal is to give you a broad selection of honeypots and a detailed understanding of the value they add, how they work, and how to successfully deploy them. I selected these six because they represent the wide spectrum of different honeypots and their uses. Included are supported commercial solutions, homemade possibilities, and Open Source solutions. These solutions also represent both production and research honeypots running on various platforms and using different applications. At the time of writing this book, all six honeypots are currently available, so you should have full access to them ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.