Information Gathering and Alerting Capabilities

As we have discussed, BOF’s information-gathering capabilities are limited. It can monitor only seven services. The information gathered for the seven services is limited to the date and time of the attack, the IP address of the attacking system, and the port it attacked. If the option of Fake Replies is enabled, then the services will be emulated, giving the attacker something to interact with. Additional information can then be gathered, such as the login and password used on the Telnet service or the GET request for the HTTP service. However, this interaction is very limited and dependent on the specific service.

Whenever BOF detects a connection, it generates an alert, and the BOF interface ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.