Page 3 of 3

Posted: Sat May 16, 2009 8:28 pm
by abcvirus
I think we can make an effective "spammer/flooder" honeypot and overtake their machine easily...
(make it slow/laggy so it cannot "brute-force" our password effectively)

What do you think?

source taken from:
http://en.wikipedia.org/wiki/Honeypot_(computing)

Posted: Tue May 19, 2009 12:55 am
by Zaffron
abcvirus wrote:this is a funny article I got of from internet...

http://www.enterprisenetworkingplanet.c ... hp/1365031

:lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol:
How would this be defined as "funny"?

Posted: Tue May 19, 2009 2:01 am
by plope0726
Zaffron wrote:
abcvirus wrote:this is a funny article I got of from internet...

http://www.enterprisenetworkingplanet.c ... hp/1365031

:lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol:
How would this be defined as "funny"?
Not sure...but I think he's missing the point of a honeypot. It's mainly to lure attackers away from the real network.

Posted: Tue May 19, 2009 2:18 am
by abcvirus
plope0726 wrote:
Zaffron wrote:
abcvirus wrote:this is a funny article I got of from internet...

http://www.enterprisenetworkingplanet.c ... hp/1365031

:lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol: :lol:
How would this be defined as "funny"?
Not sure...but I think he's missing the point of a honeypot. It's mainly to lure attackers away from the real network.
Now I understand! Thanks for the clarification - Plope0726! 8)

Posted: Tue May 19, 2009 3:09 am
by Zaffron
Nice... Considering it stated that the purpose was to draw attackers away like 3 times?