Risk Associated with Honeyd

As is typical of most low-interaction honeypots, Honeyd introduces limited risk to an organization. The honeypot is not designed to provide attackers with a complete operating system; instead, attackers are limited to the functionality emulated by the scripts.

The only other risk is that misconfiguring a Honeyd honeypot can have a more drastic effect on networks. Honeyd is based on receiving, and interacting with, the traffic of nonexistent systems. If you mistakenly configure Honeyd to receive the traffic of valid systems, you can cause a great deal of damage to your production activity. For example, if you attempt blackholing and route an entire network of valid traffic to your honeypot, then all of that production ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.