Prot probes

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Blakebbarnett@bloodsystems.org
Date:  
Subject: Prot probes
Haha... What a great idea. I've gotta try that.

* Blake


-----Original Message-----
From: rleonard [mailto:rleonard@aprnet.com]
Sent: Friday, July 07, 2000 11:35 AM
To:
Subject: RE: Prot probes


I thought this was a great scenario, using vmware as a honeypot by
simulating a whole network using nothing but 1 machine and multiple virtual
machines with different O/S's

http://www.vmware.com/solutions/scenarios/security.html

-----Original Message-----
From:
[mailto:plug-discuss-admin@lists.PLUG.phoenix.az.us]On Behalf Of Trent
Shipley
Sent: Friday, July 07, 2000 10:34 AM
To:
Subject: RE: Prot probes




If you can afford it, you can always leave a honey pot. Set up a machine
that is not protected, log all transactions to tape . . .

> -----Original Message-----
> From:
> [mailto:plug-discuss-admin@lists.PLUG.phoenix.az.us]On Behalf Of
> Barnett, Blake
> Sent: Friday, July 07, 2000 9:37 AM
> To: ''
> Subject: RE: Prot probes
>
>
> Another fun trick is to download or create a simple logging daemon that
> listens to a port and finds out exactly what they are probing for...
> attrition.org has one...
>
> * Blake
>
>
>



_______________________________________________
Plug-discuss mailing list -
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss


_______________________________________________
Plug-discuss mailing list -
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss