[clug] Stopping them at the door

Antti.Roppola at brs.gov.au Antti.Roppola at brs.gov.au
Mon Feb 14 04:17:32 GMT 2005


steve wrote:

> Another much more fun type of honeypot is a case of building a fake
> shell experience for the hapless third party. They will be back time
> and time again to work out what the hell they have stumbled on, and
> you can get very twisted in messing with their minds.

Just be *really* sure that it is completely secure. It would be rather
embarrassing if an error in your fauxsh was used to compromise the machine.

How about redirecting port scanners to each other?

Antti

---------------------------------------------------------------------- 
IMPORTANT - This message has been issued by The Department of Agriculture, Fisheries and Forestry (DAFF).  The information transmitted is for the use of the intended recipient only and may contain confidential and/or legally privileged material.  It is your responsibility to check any attachments for viruses and defects before opening or sending them on.  
Any reproduction, publication, communication, re-transmission, disclosure, dissemination or other use of the information contained in this e-mail by persons or entities other than the intended recipient is prohibited.  The taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited.  If you have received this e-mail in error please notify the sender and delete all copies of this transmission together with any attachments.  If you have received this e-mail as part of a valid mailing list and no longer want to receive a message such as this one advise the sender by return e-mail accordingly.  Only e-mail correspondence which includes this footer, has been authorised by DAFF 
----------------------------------------------------------------------


More information about the linux mailing list