Re: [ISN] New Decoy Technology Designed To Sting Hackers

From: mea culpa (jerichoat_private)
Date: Tue Jun 02 1998 - 19:06:07 PDT

  • Next message: mea culpa: "[ISN] SPA Cooperates with FBI in Five Raids"

    Reply From: Felix von Leitner <leitnerat_private-berlin.de>
    
    > [Moderator: Fred @ all.net was playing with this idea. He called it the
    >  DTK (Deception Tool Kit). He and I had a few rounds of emails discussing
    >  the pros and cons of this method since he had that idea, and I had been
    >  running some basic characterists of such a kit on sekurity.org .. ]
    
    Everyone is playing around with this idea sooner or later.
    The classic example is the 'Berferd' incident.
    Please ask Altavista for it, Steve Bellovin was playing honeypot with
    some hacker who identified himself as Berferd.
    
    But the point is that companies shouldn't be paying money for honeypots,
    they should pay money to make their networks secure.  This "product" is
    a big waste of time and money.  If people invested half the money in
    good people they invest in bullshit tools, the world would be a much
    safer place.
    
    Felix
    
    -o-
    Subscribe: mail majordomoat_private with "subscribe isn".
    Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:55:07 PDT