You are on page 1of 38

!

" #
$%
!
"# # $ %& &'(
)*+ & , -./ -0 &1 2$3
" 1 1 -#4 5&1 $ % 6 #( '
/& )
"$ 9 7 . /. "&+8 7
5 1 &+8 7 $ ./ # #('
/ &1 . '+ & ):
< ) ;

= " )7 >; " 2 -? 1 &+8 7 *+ $ #( '/


B./ @ !1 A 1

@1

" . /"7F &G - (


/ !- ' " )E / C "D
$
Definitions and Value of Honeypots
#'/ "2 /!9; $ 7 G= ; "
42 &1

& 8
&H#" ' &1 " = 9 &-7 &1 & 1
# -I &1 " " C # -I C4 1
-& L 1 M 5= J K 7 & &+8 '() #- " /
B '
P M 57 2# #C3 1$ # 9 = 4 NO

" " /&1 ) -?(" 9 # N &1 C/7'0) 1


1 5!Q $" ".P R LP ' ' # ')= &9
= 1 -= ; T 91S = ; M O$ = ; $
U $ #$ 1 = 4" # #$#BBB " #
B# #$V L1"I G -= .- &1 = ' 5" +
<# 9 # "" 47 ') L1 )I G -&, ;I '
-&1 ./#@ /./# G & 1 " ; #7 1 1
5 &1 H1 " !; M O7 = , '1 #
B7-J W " 9
;)"./ # 5!Q 9 ##* P= 1 & Q7 '1
B#1 = -
' R+ = G N1 LP.Y/ ;F #" & 1X
M 5J K 2 &1 & 1 "&N O
7' 4 2#&1 " # - ;)M 5J K7 &(K" - +
B./ [ 9 Z -?(
9 #F \51 9 &1 ./ # 5!Q ## 1 & 1 7
-" &' P ./##4 U # 5!Q &1 &- - 9P
B -] P&' P
$ #('
/ 1 &- 1 5!Q ' /I @O"&1 M 5J K
6= '+NP" 5!Q = "%@; "^F- # N/#4@1
J KI #/ 1$&1 B - &9 =" 1 O 6"$_
. ' "&9 &1 M`' = a -= ;' / ' /I M 5
S%&9%= 1 ZS?- 5!Q = ##4=" 1 &- 1
&9 =" 1 ;5$ " 1 [ $ 1 S%" 9 O % #
I # " -M;5&,I 5&1 ) O
B H1 O 9
\51 " # 9 I &1 ./ # 5!Q
[ " 1 &,5J K *_5Z F 9 #' P2#&1

7 &1 =$ &H## 9 2; " -&-C" P& S 4 H1


<b&-#
H1 1= _ L1 S 4

$ 9 &-# & '. ' X "/ #&c I


,-&d!4" # -I " /2" Q&1 R 1 -
/% 9 7 = )# #N' M3#&1 B# "% 1 &1 = 91 4
7'4 2#&1 9P&1 e =%&9 7``Y' " 7 $ .
J K$ #( '
/ %= 1 7 '1 " &Q 1 9
B 1 M5
&1 M %" ##f `'4 -7 &1 #4 ' /I %
&-./= ' a -@O" # " /C Z ; " /C I
#- C` 7(
,g4! h Q$ %&1 "# $ iY
2#&1 = 1 $ # = LP2 "[ - #('/ %@1 $ "
*` U# a - ' /=" 1 &Q 1 9 7'
4
B -
O
%#" " U' . 1 " / &1 &(K" %C
C ) ' 1 *K BBB "BBBB O
%M O
$ '
/"#ZB 1 9
[ Y

,O= = 91 4$ . / j!Q 1 " 9


&1 - 1 # =" ; -L) &9 9P1 "R 4
"7'F)&1 j" " Md" C [ " /C Z M 5J K
B - " /= &+G&+G # -
' = 4 / ;5&1 L .- # ' 7``Y'
I, P9 %g/ &- &' 0)$1 " /=" 1
< $ 1 2#&1 '
/# #$

T 9 " 9 7' 4 2#&1 1 "!5 9 = -= H 1


./# L = H#.;8? 5!Q &1 ' / -
B 1 F ' / " #&1 9 & 4 W %" -
= a -&1 " - &, ; = " /&1 9 I '
O" //
;, "./ ' ^Nk = # ' / "&9 % - ?(
@, ' & $" "J 9 7 # "$ l &Q 1 C"
= ="9_-= H "M 5J K I # "%# 1 1 B.
#(
'/ ' /&1 #" "= 1 ="&- &1 9 I
,
d = '/ I = , &,/"7 1 " )% -
[m.P)

9 M9 7 &1 &-*+ &G H1 ./ 79; *4


)#/7 &1 & O H1 1 & ( /' .4 2#&1
= 9 B#$ ; 2#&1 -&1 l = &, ".
L &9 &1 ?( ,5" 1 31 # /= # ; V L1
B 1% P
\51 M 5J K = 0H " & ) # 47 I G - '
<#F &,$ 9 P

1 $ " ' j!Q 1 L M 5= PK# "$ %


" 9(' 7``Y' = P 1 " F-#4 -$ ./# 1
g/ &- ,5J K j &1 &'1B 0) 2- R 4$
M- 1 4"I 9 )# & N &9 e -
B# ## " 9 g/ ' /
1 R " # -& N = 1 e -# / H# /$
n' # 1 ' / P ' /&1 &- ' / 4 #" 9 -
o T % 4./ 1 = 0)&, ' /$ &- 5!Q "
B#1 4 0)

,
-^ N
@ q( N 1 1 q &G Honeypot &p P #C" 2O
&1 &r&>%$ .Y/ q Honeypot ^ N B./ %$
q, pF : &r. 7 $ HoneypotB 1 / q U
s ;' / "R %s #& rq; M s 1
M1 O L1 t %] 5 #B 1 q; #$ / C 4#i YF
B ' #( '
/ M1 Oq(
,'
Ys , p &1 &r 1 q qP N
#q !; ^Fr$ #2_ q s r %
"< MN s ' 5 r 7 4%gk IPv6 s &p
Honeypot &r ./ \51 0 J N 7;
"^ N M1 O 6 L q' $ " / 1 U &1 s O L1
<< PM1 O 6
rq #( '/ $^ N $ Honeypot Ps 1 7 &'+
#( / 1 &r 1 q q 5!Q ' /@ t Honeypot I
'
j" F "$ _ 1 = '+NP$ 5!Q #4S?-l$ $
B - = "%@;
F &9 I # M 5J KI LH $M9
^, 'Y s & ) q ; &r 1 q q, r ^ N t 7 &'+
s + & # # B./ &' P) U # Honeypot
B# "% 4 %q' l$ " Honeypot s 1 q( ,'Y
l$ T _)q # "%31 # &rq( N # %&;
d &1 B /; # %1 &rs 1 f Y s 1 %76" #
t %B rq r d 7; &1 Honeypot q ; q, r
t s u d &1 B 1 q $ _ "1 '+NP$ qN
% $ rCv &p $ qpP : Honeypot
1 s R r &r./ qN 1 7 B q O. +NP:
1 s '+NP "$ _ q1 s R r 8 Honeypot t
t q Honeypot t 1 A qN B 1 q & F
%2 ( &p%C B 1 q S &(
` t "&, ; Ts#$#
q)#/ 7; "[./ Q 7; "Z / q U &1 #/
Honeypot $ LH .( H #('
/# 7 \51
B2 # # 7 # r7 " `O&+8 7 #7 &r./
Honeypot
q Honeypot T 4q &GHoneypot I $ &-7 &1 & 1
#2_ $s -
2_ C # !; # #q F #- P •
w9 $ " 7' # &H "# " )?( # - M N •
$ C ;N Q &1 T&9 q / $ X )?(ZqNO"
B -q j" &9 # ' / 7 0* /%"7 ^ Nk
-q q1!O ' / 7 1 7' P _, -J d %&-q $
[B -#_ 7 w8 1 s 1 Q4q)#/%I q
d !; x #!1 x ' 9 #- P•
&'P)
$ q 5!QZ &,
; cL # #q 5!Q # - P •
[ 4q &GT ' q -&G )?(&-7 M O
)?(q O# H "q1 # 9 #- P •

Honeypot
s q s #q+"# #s #/ 1 2 ( Honeypot
B 1q s ; O
" Pl$ s #tG rs ## By
B rq s "%@; ## qpG r _ t Honeypot
# 5!Q . 1 H) 7 G $" t # &p s &1
#g8PHoneypot g/ r 4? # " . os ,P
4 x $yzzzz + s &1 B r 4? 1 . 1 H 7 G
1 # B rq + 4 x $ y g8P %$" t #
" rq . o s '+NPg8 P Honeypot &r
" $ _ "1 . +NPt q Honeypot 1 qQ
G 5!Q &r 1 q M+ #7; &1 " B 1 & F 1
%&r $ 1 q s# $l$ s # Honeypot tG r
gk Honeypot g/ " + ? 1 # P g/
t 5!Q M, W " & L_ &r 1 q N 1 7 B./
d &1 . o 5!Q $ [ '$ "Z '/%Honeypot
B 1 q q,
r
qp'r " L1 B{
%.;/&1 &rsLG &r q Q 7 s 1 Honeypot
&rs s p'
r " L1 1 B r 4? # q S0
B F #!O

' 7 '
;r B|
g8
P %&r $ #$ ' 7 ' ;r &1 Honeypot
q; O2 ' t 1 7 1 1 B / q . o&1 s '+NP
q q' &1 B n 1 &p t "RAM . 1 H y{} 1 "
B# rs$/ # %

IPv6 # rL B~
Honeypot [ IDS Z q' s D + p q4 1 J!4 1
&+ 7 B rq rIPv6 " L s W 1 S 4q,4
q ' P)Honeypot t #& HG # Pt &r.
s '+NP"&' 4 % q #4 Honeypot $#
B r. o %
$ ! "# !!

Honeypot % &
q( Nk A8 s #L Honeypot T D + p q ; &
7LH Honeypot &r 1 q ., 5 17 B 1q
r H#s D + p r #&p, 1 q; s H#sD + p
B rq
<# # ( Nk & 8 O&N 8 Y,
1
#. #"W •y
&1 &r r. o"s H q q 'NPg8 P Honeypot
B 1A # %1 8 ' d
5 1 &rq!; Honeypot
./ 2_ C # H#s ;' /& ,
"MNP % " )?( &p L &1 r. o q;
B 1 &' #Honeypot 1 q+N(

t •{
R %s #B 1 q t s # ' s D + p &;
t s HL B # % # # r& 4 "?( t
&,
; t ' ./ 7p; IDS T# # L 7'p
L %B ' $ sL_ Honeypot B #i YF
7p; Honeypot &p f `4 &1 B 1 q t s #
" p # Pt g/ ' / C 'r7' P)./#&1 t &r./
p 7 &'+B 1 &' # H#s ;' / &1 #$ & d
&p &1 &'1 " rq € P Honeypot ^, 'Y j s 1
t $ "j rq #( / Honeypot $ q5 &G
'
T %j t $ #( '
/ ./ 7p;B 1 q "( 'L ;
H#q5 $ #( '/ " 1 &' # IDS $ ' ;r qp
i YF & # # B 1 &' #q # s# $ 1 t
$ qW /&Gs # Honeypot $ q5 &G&r# r 4
B 1q t
&r 1 q Honeypot # 1 r &1 " qH HG
'
F1 & # #B rq i YF % " P"l$
B 4\W1 %s"

= 1 = o l" " % M 5= J K&-= G$ 1


-- J K 7 #1 % 1 # " -?( # - ;)
2_ d 4= -2 - &- # d 4= j = #
B #

F % = J K7 j 1 RY1 7 #

Honeypot
7; " ' ( ,
'Y = ,
9 "$ # Honeypot
' 1 &9 = 1 B# M9F ;- % P&-./ \51
&5 ;_ $ "# # %^,'
Y j &; ;P % '1
# "%
R -" -= Honeypot •y
R -" = Honeypot •{
'1 % '
P H HG&- - I ;- &1 = 1 87
" % O"^Nk A8 ' &1 '1 "B -• #
I &- Q j Md #R -"B - 7 " F
B - i YF # #Honeypot 1 )?(

R -" -= Honeypot •y
#"W '+NP" A = #R -" -= Honeypot
=$/ & M 5 = ' / " " / 1 3 ;N % B 1
& 1 $ W / 1 )?( I . +NP‚ / B - -
I C 5 &1 B./ #"W =$/ & =
- l ){y &1 &- =$/ & FTP X " /
$ =# N - " login &W(d I g8P ./ 79;
&'
/#7 P$ 9 B 1 # -=$/& FTP '/#
B 1 % )#/R -" -= Honeypot $
./ /%". 1 R -" -= Honeypot = H
;- 1 I "##l ') % . ,4 "
=" 1 LP2 &G&- ' 7 ) # ' F1 %B #
" /&G 4 7 >; "# *` , 5 ' /&G
B -[ MonitorZ 1 #"=$/& %= 1
= 1 %&N/ &-./ % #/ " -#4 .P 7;
&-./ -?&1 2$3 &'+B - . .- $ = 1
= . +NP&-# \51 =$/ & = " / 7;
I R - \51 7; " # #"W )?( # P
M 5 ' / &1 H> ; )?( &- N 7 &1 B## )
B / 1 * /% H#= ' /&1 %&,/"&1 " - /' /#
7 R -" - = Honeypot 7 ,
d $ 9
%" -. o =#"W 5!Q g8 P %&-./
&'
4 !; &1 @ 5!Q g8 P&- Q
R -" -Honeypot I 7' 4 7 >; B / 1 . o&1
& &- 7 HB 1 . 1 )?(I = 1
= &P )?(&- $./ #1 S 4 $ &G ; =$/
NO" ' / I $ R -" -Honeypot I .5 / &1
R -" - = Honeypot $ B # i YF
N1 W( d #ZB# 1 2 KFSensor "Spector , Honeyd
[ %' F1 BBB /J - 1
R -" = Honeypot •{
= M $ 3 ;N %B ( ' R -" = Honeypot
" , 5 ' / $ %&- $ - #('
/ = >
=$/ & =LG : B - #('/ NO" = " /
B 0) )?( ' 4 # NO" ' /I ".
FTP " / X- +Honeypot I &- 4 ; )
X "/I ; &1 NO" X- +I 1 ; 1 &' #
; B./ LG "#Honeypot j 7 PB -*` FTP
## 1 B "%./#&1 5!Q $ =# $ _ I
$" ' P ; ; )?(# P&1 NO" ' / I
B H1 U $ IRC . F I &' P) = rootkit
= H#&-./ 7 R -" = Honeypot P7 "#
g W I "# 0) ; O1 )?( ' P =" = & k P:
B# ) U $ " = '+NP ; " # " &1 $1
R -" = Honeypot &- # \51 7;
&' U' &- # F &1 )?( # P$ 'P
<< L1 e &' ; "
./ $ Honeypot j 7 $ #( '
/ = 1 7 '1
I =" 'F #I L '/# # `O&-
7; C &1 B 1 ./#&1 IP # ' / 6 &9
$ # R LP Honeypot & H I &-./
79; " # # ' 4 # NO" M 5 ' / I )?( &-
I , - Q &1 B L1 & d &9 , d = ' / &1 ./
I = - 1 "!5 R -" Honeypot
B #2_ = ' F1 ,4= -R -" -Honeypot
& HG R -" "R -" -Honeypot &9 '1 P= 1
1 B " 1 & $ 7 # NO"C "#./ '1 - -
B - j" R -" -= Honeypot
,"
- Honeypot '( ) * +

#O #X " / I &-q # q Honeypot I


&81 $ '1 q4 1 ƒu
; q+
"# @O"T# H1 O./
B./
# q #( '
/ # s X " / &1 & 1 Honeypot I
s . +NP Y1 ) B# ) O #( '
/# . ' . '
- ^F- qd `4 w9 # qk s 5 w 91 4
. ' # B./ ( . ' # Honeypot ## O
B# )q OR %„ #.F Honeypot
s MW $ q9 # q Honeypot I . ' w9 #
#) O $
R %„ #s ,•y

DMZ 0! /.

F &'
()s MW # Honeypot 7'
P) O€ PM9
B #q
B $# q %&1 &-# #q N " L "#7 $ 2 -
I 7' # 4 TR %„ #s , #Honeypot 7' P) O1
"#" q 71 $ R %„ #.F # )?( „ / .W ' /
4#w9 & ' [Honeypot *` $ n' Z qPk
q, 4:
B# q;
) # R M &' / 4 I P s 8 Honeypot I
Honeypot ## O1 &- -q S0 "#_ &, ; s H+
•q; . oR %„ #g/ qN O "7 G R %„ #$ " 1 #
1& #s#5.+ #&-Z q, 4#?(i YF ' /"#
B -q; + F 2v [ -q + F q # 4 7 G
&- ./ 7 R %„ # s , Honeypot 7' P) O* 5
„ # )ƒ d `Y T 4q; * Pq' &1 q, 4# )?(
Honeypot q'P #I P &_' #"q " 4 I P R %
B -#"W
&1 S 4 M I DMZ I " #Honeypot 7' P) O
#DMZ " #s ' / H#. &-qQ &1 / q U
s X " / g8 P&- q %$ B# O1 Honeypot 1 1
&1 M -q/ '/#T # R %„ #$ 5 „$ $ #
U &-7 &1 & 1 "M+ #7 &1 B. 79; DMZ *, 6
T./ L % QY " $ s -R %„ #s" g 7 O
# R %„ #s , Honeypot ## Oq' + 7G #
B# )q O&
$" 1 \51 q TR %„ # .F Honeypot ## O
w9 ) ƒ d `Y T# q, 4#w9 #s q' 4
7; Honeypot 1 1 #qPk R %s #g/ q, 4#
I .F Honeypot ) &- 1 &' #& B 1 F
U s Q R %„ #7 O 1 T #q OR %„ #
B 1 $_ . ' $ q/ ' /#&- -
q 4 )?( I &- % q # " &1 q' O
" M9F 7 V L1
d 7 #B# )q '4 # q, 4#Honeypot C '-
&1 Honeypot h Q$ q, 4#w9 &1 q/ ' /# 9 )?(
&1 s#" " I P 5 &1 TI P 7 $ B# "%q ./#
s#" "I P &-q %$ "# q &' P) U #Honeypot
IP 7 5s , R %„ #T./ $_ Honeypot &1
B./ s " k q,4#Honeypot # -7; 7 1 1 B# )q;
q / R %„ # .F Honeypot 7' P) Oq, d M+ #
B./ q, 4# )?(
; &1 DMZ " #Honeypot I ## OM 7 '1
q,4# )?(q / J &-7 &1 &'1 B./ R %„ #I
Md". ' . ' &1 q R %„ #T./ q 4
B#
* I Honeypot h Q $ 4q ; .88 #
7; #I M1 8 # - &,
; qk P7; #I &1 " 1
B - U qNO" d &1 g 0+B ' 1 qk P

Trojan Horse•y

Backdoor•{

Intrusion Detection System•|

Social Engineering•~

Sniffer•…

DeMilitarized Zone•†
53 !4 Honeypot 2 1 Honeyd
Niels g/ &- ./ R -" - Honeypot I Honeyd
1 $1 - d &1 Honeyd B./ 4/ Provos
&'
9PZB./ &'
4/ X9 = , 5 ' / &5 ;_ = 1 "
$ e / 1 Honeyd B [ ./ # 1 $" "=" -
&-=LG B./ 1 #( / M1 O 6 = IP 7'
' P) U
O1 A &9 1 #( ' / M1 O 6IP I 1 1 &' # `O
A )?( 1 " # - @ O , d &9 1 RQ -
B $ 1 O= l#4" - O1
UDP "TCP ; Honeyd ] PR d &1
B - .o %= ' / 4 # ; " &' P) U $
; f 4 I 7' P) U $ = 1 7 >;
& -= 1 9 U# =$/ & X " /
-{y TCP M9" =" &-FTP " / I =$/
A =$/ & X " / I 1 )?( &- ' O
"B -
=$/ & = " / 1 " = '+NP ; - O1
FTP X " / #! B# ) U $" # -. o H#
&-=L = &;, -"= 1 -2 =$/ &
'/# " - #( / " / FTP 7'9 = 1 )?(
'
&1 " &- 1 ' " "%./#&1 - #d &-
< . G" . "## ) =LG&GC #
Honeypot &-## ) 1 =$/ & $ W / &1 &;
&1 =$/ & = " / ' F1 B./ &' 0) '
4 #
= ' P $ d 4 j U' %B - - d I
= ' P 7 &1 # -7 N !O&- hQ " '
B # F R -"
) " 1 F R -"h Q7 $ ##2_ 7 A &, ; )
< 1 F R -" 7 $ # - -7 B &, ;
'/# )?( ) &-./ 7 # & 1 7 . #"W
7 1 1 B 1 F =$/ & %= 1 Y/ : &- -# "
B - C/ )?( = 1 1 Y/ &G &- # ; %
2v I • Honeyd • R -" -= Honeypot '
F1
M-Honeyd & 1 -$ ; B # F 4
B - F ./ # -=$/& FTP = 1 &- '/#

(3 ! 6Honeypot 2 ) Honeynet
R -" = Honeypot = 1 1 C I Honeynet
M I %B 1 ; C `W I Honeynet B 1
B 1 ; *` a -I =" '1 &-= LP 2
$ * 5 1 &9 I B 1 = ;N I Honeynet
2_ %=" &- !; = 1 Q &- a-
I &- 1 &' #= ;N I 1 & U 7 hQ B# )
&9 1 Q ; -#_ &9 =" 31 C '-
B.P) U $"# -C '- ' 1
1 &'+ ) U # +4 1 O7 G &9 7 " #
9 # PB - NO"= & 1 &- a-
?( % #" - &, ; %&1 " # - ' /7
C '- #LG&; N < = 9 " 9' 1 hQ -
&- # ; # 2_ -7 % ' O"&'+B 1
# P= . +NP ; B P) Honeynet I #
'
,P" M; &' P)SSH L = . F $ )?(
& ' %&9% "1 &; "&; # O ' / #&-
L $ ; # B# . o" &'
P) U $
B - C '- )?( = - ; Honeynet
2 &1 = $" # g/ -7 Honeynet
IP ; &1 $" # 7 B # 2_ Honeywall
. 1 O= ' / .;/ &1 &- # $ =#" "
IDS &1 L _ = ' / $ 1 "4I P + "
'1 &- # 9 7 )?( &1 - 7 B - 5
# 1 &' # 1 O= ' / 1 = J N M1 OA
' / 7 $ #( '/ 1 )?(&-# ; ## $ % -
B -# "& d , d = ' /&1
LP2 $ = "` $ #
1 KfSensor
.

5$ ;: (
<: = :! > , 8 4(
- 7( ( ,8 89"
:1
Honeypot ?; @
./ 2$3 #Honeypot j "# 1 q ' 1 q %&rC
f `4 &1 T r 1 q' s # # % H "l$ &r
#( / Honeypot $ 1 & HG &r# r
' 4 1& # #
B r
s 1 &r #Honeypot &' /#"# # r !O&r ;
$ q' O
"B )q O &N+ # 88W "J
$ .UPW s 1 + 3 `W d &1 Honeypot
q( ,
'Y # # q r q #( '/ $/
&1 */ / "^FrT.UPW q &,
; $ r.UPW
r&1 q 88W . # %q'O"B# r 1 &, ; t
q s "%@; s 1 2$3 5!Q Honeypot 1 q
5 B rq € P^, 'Y s $/ s 1 5!Q 7 &'+B r
r T rq / #4q" 1 ; # Y1 s
$ q L $/ 7 / F1 #4 p1 4 4"
B r #('/ Honeypot &' /#7
R r" rs Honeypot r 1 q, r d &1 Y1 )
&p d # " q r &1 s + 3 `W 5 &1
&1 &p s" q 88 Ws , ;5 s 1 R r" s Honeypot
H#J # q %$ 2 r &'+B q &'P) r
B " r&1 L
t;r $ # &/ # q q + s Honeypot
r

[ PreventionZ s HF •y
[ Detection Z^Fr q1 # •{
[ Response Z / •|
‡( !; $ q q( ,
'Y s $ Honeypot
rM # q 2_ qp d &1 &rq!; ' 1 B r
&r rq r d 7 &1 !; 7 B Auto-rooter "
&p $ q_ t L1 $ q N1 $ #( '
/ 1 )?(
&p 7 # # s " / s 0 * /% # rR
7 &1 T# s 0 * /% # r $ X L1 7 r
#+ % q;' /q' O"&r //2 r Z B rq &, ; '/
TqP #` IP e #%t &,/"&1 "t d &1 # rq
Honeypot &rq " B[# rq #+ %L s H# ' /
./ 7 rq #( '/ !; & )7 $ &p .UPW s 1
%q' " r r !; & H .5 / q &r
s Honeypot Honeypot $ &' /# 7 &1 < r ^O'
B )q [ StickyZ G
#&r q e #%$ &' /# %T Honeypot M 7 #
F R r" %&1 " )q U #T q; #( '/ &p
R `O )?( S Y & 1 t &p H qN B #q
q e #%$ &' /# %&1 Honypot T# # e #%$ q_
1 C s 1 #q F R r" 1 q; # &p #&r
q &' % !; & )7 " TCP s v $ #( '
/
B r
C#)t # )?( T ( d _ 2v ## 1 T& ; s 1Z
s 1 7 [ rC/ H#s &'1 ' #q M
&rq r 1 1 #.UPW " F' .5 / # r&' %
B./ */ 1 #q O2_ # q,4#&p
B 1 q Honeypot $ &' /#7 "L LaBrea
R r" rHoneypot t 5&1 *,6 Gs Honeypot
B q &' 4
1 3 A!0!:s Honeypot % q ; &'+Z
[ rq r&p # )?(t ?(.5 /g8 P %&r $
)?( f Y $ ; $/ q 7 >; Honeypot
" \51 &r 1 q s &, g8 P r7 &'+B r.UPW
r&G ./#"n) )?( qN B# q )?( S 5
1 R ) # &,/" &1 " .O "h Q 7 $ '1
^Fr 1 q ; $/ 7;k # B H1 Honeypot
!; & )7 T / s 1 2$3 $7' #" )?(s '+NP
B r^O'
$/ &r 1 )?( ) B .P 31 &, t q q'
' / 2 r &r q+
" r q #( / Honeypot $ ;
'
%ˆ&r# ##4 7 ? #q H t &F; 1 q Honeypot
‰<< 2 'P)Honeypot t # ./ q88 ' /t 7
#?( pP&1 H> &r# \51 q H 7; ./ 7p; "
B' ( ; &p
Deception B / ' 1 )?( q Honeypot 7 1 1
B 1 q R r" rs Honeypot j 7; $ qp Toolkit
$ rq t;r $/ .UPW &1 Honeypot &rq "#
&r 1 q q W1 q,4 B8AM;5B./ q1 # ^Frh Q
RY1 s q)#' P r$ " q q / l &(K"
&G &1 $/ t . &p $ U J d B 1 q C ;8 6
&r ' P q %s &p s 1 qO( 3 ;N 1 q d
" !pF $ U J d B## )q . p $ q N1 \51
T #q 2_ &, ; t ^Fr s 1 f Y &r q s ) #
F R r" %&1 @ /q,4 q # q / &, ; t q'O
"
& ( /' B# r ' ;r % oMO "# r^O' % "##
q sD + p B 1 q q, pF r 1 &,; t ^Fr
B 1 q o "1 q $ [logZ@ O ". os ,P" IDS
$ %q ; 4 &r rq + q " Ps ## %
# #&1 " # 1 L ##7 $ s 1 " , Qq q" P
q L !; ^Fr # %7 >; B 1 q Y
B r rIPV6 " L s gW 1 q; q' B 1
7 &1 . &, ; t q1 # " ^Fr s 1 Honeypot
1 " rs ##Honeypot B #s 1 q; Os D + p
q " P 1 l$ &r rq s "%@; s ' F1 78 " @ O
&1 q, p Gs r " !; q q' % B# #
L IPv6 " L s W # q " r^Frq'
B #( '/
Honeypot $ &' /#7 &1 @ s ' F1 5!Q &p s 1
Honeypot:Simple,Cost Effective &+8 q r* r
r s Honeypot . &1 B r &N+ Detection
%s H ".4/B 1 q ^Frs 1 M 7 '1 R r"
t 7 >; " 1 q R r" s Honeypot $ /%
B# # %&1 . s ' ;r
.UPW s $/ honeypot &rq 7 4%"7 /
t $/ t &rq $ B./ [ Response ZDE6 rq
/ 1 & HG C ##i YF #4 &p # q, pF " 4
t &r 1 q R+G $ qp q j k 7; b #
&p 1 #q;r 5!Q 3 ;N B 1 q & %1 $/
# " T< #2_ 4 q s r&G " <./ q r&G )?(
s . +NP 1 # 5!Q 7 ' pG r . Nk" 7 # B# #
B./ q ! " T )?(
'1 m# ## "MpF "#&, ; t &1 */ / #3 ;N
q; &'P) O2_ # &rq ' / ' F1 T&p
s ' / B .4 r$ T*/ M, W "& L_ t s 1
1 $/ t s 1 qp " ' p+. " / Tq +
t % " / &r F1 & ' ) q' " 1 q q "
& L_ $ 1 r$ ' /7 ' k $1 ./
B# ## %&1 q/ / "# 2_ %s" q8O #M, W"
1 q rC # ' / 7 &rq H # 1 ] 5 #
q q' / #&1 '&r# q \51 7; B# rq/ 1 %
&1 p g/ 4 8 &G " ./ #' P €( &G &r # 1
# " H#s ' / &1 )?( %"./ #" '/
b<# # " q "b./
r$ L ' / ) q' &r 1 q _ # H#MpF
q' / #&1 q; &r# ## " ' / # ## 8% $ 1
Honeypot ] 5 #B./ )?(&1 h, N' t r&r & '
q %&r $ T 1 q q+5 1 q r7 G s 1
%s" q, rM, W " & L_ .4 r$ q /%&1
B# # "s & d $/ s r " &1 &p "1 # )2_
& F 1 "q O 6 s . +NP Honeypot 7 >;
M, W "& L_ &r./ M+ #7; &1 " rq 4?#4 #
q qNO" ' / t $ /% 1 t Honeypot t
&1 A 1 ./ 4?Honeypot #&rs ## B 1
&1 p 7 j k 7; " 1 q )?( # Ps . +NP
j 1 #s ( 5!Q &1 . q,4 &r #q $/ t
B # %&1 s o "@ / / " # 1 q )?(. "&, ;
q & L)7 '1 / s 1 R r" Honeypot q, r d &1
`O )C!4 &r. # 1 ' 1 C!4 t &1 / s 1 B 1
T r#_ C!4 &r./ &' & HG "./ &' # s r&G
&, 7 s 1 X B./ # r #( '
/ q L1 &G $ 7 >;
B #R r" Honeypot &1 $
" 1q sD + p t Honeypot T./ , &r&>%
s 1 % B / 1 M p &1 ;a1 1 q" P $
T# #$ q' M s 1 $/ t &rqP $ s 1
^FrT?( t $ s HF s 1 s 1 " 1 q */
B rq t;r %&1 / "?(
0G H 0I :@ : Honeypot# A : A #F!@
08 )J= :

E ? G #F!@ Honeypot # A K H! I

,
d ' /I $[M 5J KZ I i YF $ Q

B 9 %& 1 I 1 " ; C" -7 = 1


C ?;(
VMware
Ts$_ 7 ; O LP2 &N/ s 1 q Q
4q &-./ q -" ' / " LP2 ) #
B 1 q// v s LP2 ' 4/ #
"#I $ R 1 1 "C/… $ R 1 . O1 LP2 7
2 ) #&N/ Ts LP2 3 `W V L1 L 7
T -q #O LP #&- &9 .W s & 1 7 >
T.P/" 9 s $" "Linux Net ware q
& I s" desktop - T.
s Š"s &` `4s$_ s 1 &9 U (Virtural
Networking) " $ d &1 F- 2_ Real time &1
" & s 0)• ' drag and drop $ q ' F ( PXE
R $s gW $ [ 1 VMware s " k &,/"I
./.
‹ " s" ‹
r&‹
rq;'
‹ / ‹%&‹
r.‹
() ‹ 4 ;‹ &1 $ r
b 4 &p rVMware .W

s$‹
_ s‹ " ‹
/s$ ‹ s ‹ "q,4 VMware $
1 ‹ .O
…&F #(
'/ q

M 5J Ki YF #&- 9 I ;- ; &1 .O
" ,4 -7
.
!"#$
!"#%!"# !"##!"##!"##!"##!" & '

( () & '

* ( ) '

$ + ,- "! ( () '

$ . #" # $ / 0 "1
! . '

$ 2 0 "! '

#'

i Y‹
Fs ‹
1# s t p &; 1 "!5&r H1 1 4% #
‹ t‹q ‹ i Y‹
F ‹ $‹
1 q,

d s‹ " ‹
/$ q t
s‹ l" &‹
N+ ‹
1 ‹ i Y‹
F ‹
O7‹ "< #‹
1 ‹ 4q ?
?( T ' /. W T ./ 4 # 1 ' /# 4 1
t‹

‹P T " s 0‹

H "'
‹‹ /s ‹
‹) ‹

OM‹

W T'
‹‹ /&‹


1
B # ./ 1 BBB "q'
P # q+/
# 7 1= " ; 1 &' &-2 "
B 1 # - % -* P&
#= 9 7 '1 $ X95 G
Author: Satanic Soulful
E-Mail: Satanic.Soulful@GMail.Com
Satanic_Soulful@Yahoo.Com
Developed In:Satanic Digital Network Security ™
Special TNX 2 :Hell Hacker – Mr.P Hacker – I loveu Mct
Collector & X Hulk
Research By:5/-\t4N1C
©®Copyright For : Satanic Team 2005-2006
For More Information Go to Http://Hack-er.cjb.net/

©®All Right Reserved For Persian Hacker’s Œ


Mr.PHacker_Ir
2005-2006 For More Information
Visit:Http://PersianHacker.Net/

B 1 "$ 9 7 = &1 A 1 &+8 € 8 2;

Life & Girl’s Is No Matter’s


The End.

You might also like