Rogue Access honeypot (revising and re-shooting)

A honeypot in computer terminology is a trap designed to detect, deflect, or mislead the attempts to compromise a computer system or network. The typical honeypot is a computer, piece of data, or network segment that appears to be part of the real network, no matter how isolated and/or monitored the network is. Most honeypots present themselves as being vulnerable and containing something of value to lure attacks away from the real target.

There are typically two types of honeypot. The more commonly used one is a production honeypot, which is designed to be part of a network defense strategy. A production honeypot typically involves placing honeypots inside the network with the goal of luring hackers ...

Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.