Jump to content

Recommended Posts

Posted (edited)

uhm yeah, i've seen it done, and wanted to give it a try, i've got two...maybe three (depending on how you look at it) questions...

1)would splitting the internet connection via router, then hardware firewall, then honeypot, be considered "over kill" and would simply connecting the honeypot to the internet via wireless router (that other computers connect to the internet through but are NOT connected to each other through) be "under kill"

2)how do you log the data and then keep it safe from the attacker modifying or destroying it (after all what is the point of the honeypot if its logs get trashed)

Edited by itachis.eyes

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...