Selasa, 04 November 2008

Trapping hackers in the honeypot

Windows XP software, AP
The honeypot logged attacks on a typical Windows machine

In this second part of our investigation using the BBC honeypot we recount what happened when we let the machine get infected rather than just log attacks.


It is rare that you would willingly let vandals and burglars into your home but a controlled environment like a honeypot computer lets you do the technological equivalent in relative safety.


The idea of letting the PC get infected was to see exactly what nasty programs hit our machine and how easy it was to recover from infection.


Firstly, we visited a few of the websites mentioned in the many fake security warnings that pop-up unprompted thanks to loopholes in Windows Messenger.

Trapping hackers in the honeypot

Much of the software available via these bogus warnings turned out to be a nuisance rather than downright malicious.

Tidak ada komentar:

Posting Komentar