itachis.eyes Posted October 15, 2009 Share Posted October 15, 2009 (edited) uhm yeah, i've seen it done, and wanted to give it a try, i've got two...maybe three (depending on how you look at it) questions...1)would splitting the internet connection via router, then hardware firewall, then honeypot, be considered "over kill" and would simply connecting the honeypot to the internet via wireless router (that other computers connect to the internet through but are NOT connected to each other through) be "under kill"2)how do you log the data and then keep it safe from the attacker modifying or destroying it (after all what is the point of the honeypot if its logs get trashed) Edited October 15, 2009 by itachis.eyes Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now