±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 0
Overall: 26959
Visitors: 69

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Honeypots

Computer forensics discussion. Please ensure that your post is not better suited to one of the forums below (if it is, please post it there instead!)
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
Go to page Previous  1, 2, 3 
  

Re: Honeypots

Post Posted: Thu Feb 21, 2013 4:40 am

- Sarah_Camp

My project scenario is a hacker not realising it's a honeypot.


I would give for acquired that you don' t have "Hey, I am an honeypot!" printed all over the pages of the site.

Earlier you stated how the idea was "someone hiding their tracks on an honeypot".

So I am not getting it.

I mean, does the hypothetical hacker ALWAYS try to hide his/her track on ANY site?

Then the dissertation is about "how to find attempts to hide tracks on *any* site" or "techniques used by hackers to cover their tracks".

Or it is about techniques used (or to be used) by the "good guys", and then the dissertation is about "how to create a honeypot capable of preventing tracks hiding by hackers" or "how to use honeypot techniques on your site to prevent tracks hiding by hackers".

Same goes for:
- Sarah_Camp

Do you know if honeypot log files can be used as evidence in a UK court?

I mean in which way a honeypot log file is different from any other website log file?


jaclaz
_________________
- In theory there is no difference between theory and practice, but in practice there is. - 

jaclaz
Senior Member
 
 
Reply to topicReply to topic

Share this forum topic to encourage more replies



Page 3 of 3
Go to page Previous  1, 2, 3