I'm doing some research on honeypot detection, and preventing honeypots from being detected. I'd greatly appreciate some feedback from pen-testers on the following issues: Do you worry about being detected by honeypots? When you do a pen-test, do you already know of the existence of honeypots, and their location, so that it is an easy matter to avoid them? If you are concerned about honeypots, how do you test to see if the system under attack is a honeypot or a production machine? Thanks, Larry --------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com ----------------------------------------------------------------------------
This archive was generated by hypermail 2b30 : Tue Jun 17 2003 - 16:26:09 PDT