%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R >> /XObject << /I1 17 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240517092410+00'00') /ModDate (D:20240517092410+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 11 0 R 13 0 R 15 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 3558 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 318.219 521.469 428.515 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 318.594 520.719 427.765 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HONEY POTS TRAPPING HACKERS)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(Apparently bears find honey irresistible and in the same way hackers can't resist the challenge to )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(gain access to a computer or system.)] TJ ET BT 61.016 530.247 Td /F3 9.0 Tf [(A)] TJ ET BT 72.023 530.247 Td /F3 9.0 Tf [(Honey pot)] TJ ET BT 113.045 530.247 Td /F3 9.0 Tf [(is a computer system set up as a trap for)] TJ ET 0.373 0.169 0.255 rg BT 280.616 530.247 Td /F3 9.0 Tf [(hackers, crakers and scriptkiddies)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 280.616 529.096 m 416.156 529.096 l S 0.400 0.400 0.400 rg BT 61.016 515.747 Td /F3 9.0 Tf [(trying to gain unauthorised access to other people or a company's computers or systems. The )] TJ ET BT 61.016 501.248 Td /F3 9.0 Tf [(trap is set up to detect, deflect and counteract unlawful usage of information systems.)] TJ ET BT 61.016 480.557 Td /F3 9.0 Tf [(The trap consists of a computer, data or a network site with valuable information for hackers and )] TJ ET BT 61.016 469.568 Td /F3 9.0 Tf [(crackers. It appears to be part of a network, but in fact, runs completely isolated and is monitored )] TJ ET BT 61.016 458.579 Td /F3 9.0 Tf [(and discreetly regulated.)] TJ ET BT 61.016 438.590 Td /F3 9.0 Tf [(Maintenance of a)] TJ ET BT 132.557 438.590 Td /F3 9.0 Tf [(honey pot )] TJ ET BT 174.587 438.590 Td /F3 9.0 Tf [(requires a large amount of attention and won't necessarily )] TJ ET BT 61.016 427.601 Td /F3 9.0 Tf [(guarantee a successful outcome. In some case it will only serve as a learning experience and hackers won't necessarily )] TJ ET BT 61.016 416.612 Td /F3 9.0 Tf [(be cornered.)] TJ ET BT 61.016 396.623 Td /F3 9.0 Tf [(A network of these traps set up in a production environment, is called a)] TJ ET BT 348.656 396.623 Td /F3 9.0 Tf [(honeynet)] TJ ET BT 385.682 396.623 Td /F3 9.0 Tf [(. The term originated in 1999 from a )] TJ ET BT 61.016 385.634 Td /F3 9.0 Tf [(paper by Lance Spitzner, founder of the)] TJ ET BT 221.612 385.634 Td /F3 9.0 Tf [(Honeynet Project, )] TJ ET BT 295.646 385.634 Td /F3 9.0 Tf [(called)] TJ ET BT 319.154 385.634 Td /F3 9.0 Tf [()] TJ ET BT 321.656 385.634 Td /F3 9.0 Tf [(To build a Honeypot.)] TJ ET BT 404.699 385.634 Td /F3 9.0 Tf [(\(Read Spitzner's interesting article )] TJ ET 0.373 0.169 0.255 rg BT 61.016 374.645 Td /F3 9.0 Tf [(here)] TJ ET 0.18 w 0 J [ ] 0 d 61.016 373.494 m 79.025 373.494 l S 0.400 0.400 0.400 rg BT 79.025 374.645 Td /F3 9.0 Tf [(\))] TJ ET BT 268.393 354.656 Td /F3 9.0 Tf [([SOURCES:)] TJ ET 0.373 0.169 0.255 rg BT 320.404 354.656 Td /F3 9.0 Tf [(http://searchsecurity.techtarget.com)] TJ ET 0.18 w 0 J [ ] 0 d 320.404 353.505 m 462.964 353.505 l S 0.400 0.400 0.400 rg BT 462.964 354.656 Td /F3 9.0 Tf [(& www.wikipedia.org])] TJ ET BT 61.016 336.167 Td /F3 9.0 Tf [(Posted in:Security | | With 0 comments)] TJ ET q 101.250 0 0 135.000 449.734 437.824 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Annot /Subtype /Link /A 12 0 R /Border [0 0 0] /H /I /Rect [ 280.6157 529.4143 416.1557 538.5718 ] >> endobj 12 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/af/2013/10/18/hackers-and-crackers/) >> endobj 13 0 obj << /Type /Annot /Subtype /Link /A 14 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 373.8124 79.0247 382.9699 ] >> endobj 14 0 obj << /Type /Action /S /URI /URI (http://www.spitzner.net/honeypot.html) >> endobj 15 0 obj << /Type /Annot /Subtype /Link /A 16 0 R /Border [0 0 0] /H /I /Rect [ 320.4043 353.8234 462.9643 362.9809 ] >> endobj 16 0 obj << /Type /Action /S /URI /URI (http://searchsecurity.techtarget.com/definition/honey-pot) >> endobj 17 0 obj << /Type /XObject /Subtype /Image /Width 225 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 11509>> stream JFIF;CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 80 C   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((," }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?ËʬTVm#*ZQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ b$S袀 ( ( ( +'T1KY&]ɬ%ts2?*yA򳧢w'3]/1٩D%?P~@,mg! g?ٶ[vKr=Sb-dz،"nک+vJ*EV԰Umj˫۩h%G բJAawh㵵6zFKgQ`qGc̶-QEQEQEQEQEQEQE~UKYl]:[N-bgsܟA\s?3hcqt֥[-QIwcmJN֎6~2}up5ZY?6ں EѬ㶰(ӠQ֕ oJ# mi\q5|~YUխRQZ[#' cOUi@PG`}(n_dظ-.z4?`J.%BdcHm|[OLVgf"tZ="_}P%9JFmKy?{l=+*zv&1ڒ}_pTYkI>uPJFw,}~~8Ek6:LStHmxϣ)RVlAR8a+~d3|Fqt"uWן^ Aiخ~UޕS[QT (((kZqjs`\Oe'+DׄxQ!a1vL:~g95hpՅ]5M:M;<[vHd+{? iqFAfR(3?@+/GI͵o;sP㳖\SEy^zKT͸S6'ࣷԚIo^q8._W|Sp?OZb) 8z"Q<[M""/$7gmEn&ҼW?|A|bO?(_e\8i=^7>/aϕ9#xa}?ZͽͬY岷\{?_= 78c*ny:=_a,L#eGK0Z]Z՗(YhO#s x&`E:ZP%`%ݞY}sŬ,zgABeY?⮍k{zE^G7蒶}I09vtG#ҸI 4nA *%wV/#J}41HԴ{pO AO 56 ֞pK뇷cGjo]ɖt>ƒ^ݕ .vһ-L7QEqnp:⽬te;ecVk𧍞(iچ xY>HVkZ Iyf64[#uVsZ^񵮣 F yryI tă0^m~AV ϳy೨Jׇk)%뎇>{,g"#lQf7ڹ7ܮeF_q忿Ӯ3gύcZ_f^Q?pp}Y6,SlKnRpj\ /#ר3$>`Rz =5֑3j(Q@Q@w]bM+“EfooO٢=?yWHѵ-fny2YAvvwѦ!N6'Uu=T\#yIecIo%RҔKΈKimx[ 0Npv;q=xL֖JAm:5x;\^Mhdܲ}??.=\4Xy3\??dbmR ٚ8SWu>bD$uιx0Km>ĀrOS @1:sӭRCp>񦓢iWd6޼GZYB9PIcl%ibnxF$`ROVE9"0 ϭk)6g:m$Չf3sU?d0D{+Tԡ8%ͭ9ε\Q+ZXiΣlʰi~ѧO&8 ![z{xh+#ok+HK̆?wos2#2.?*;>?s^/VPgi,X`mO6:=UM<5Wnw)>ʺi{ T>%:4p`j6gϋ?zVu+xBV?!I*ku Ri(G@!CxUZKi &V-$q}5 %Q?SQiYÛ𿌍3=Ÿg65}#_8;?\[1xd!$xj.;7~N"kQEQEQEpn|UpA찈1sWwYx|]Nlu/"*苏WY ,~ Zܡ?s>M:`v$l0pyq}+3_ⶴ-dӠIn9YO?Z+n5{;ܞR:bH獡άxSJ3.rALuoõsn^VuӊM -'OF'g_ em yd:k9CY-F4FU7Z+Tzl%Ecm?Vz9QN~ WAuh Q ȏ$*cu?:VŖn4QIY<n@OBt8 SoSȑz0<+5 s>%T@t$ko $5^Hk5k:gpGkxK[1.vi7̓0FN{ ^io0Ҿyh(c: \b[nH D]wUV]EWiQEQEy}jHR@Ǩn#5z|Kay$~Uͥ#v^W)k:52Gn&sמ[^m9 <МpʳNI535pǾ?vzCQ FO[ؖZț${WUwj8;d$vX.c s؄jKHo*?yo {]*?ݼ[Na*ku!Ǿ)(>Ӵl\<$FsZ5=i*EZb.ҧQMAS(bS"Ӕb$Ȩ.$~d2B-Mxi3}r9њ2sU/4vi4;gZ75>4YH%P1&^ywQ).Er CF9 }k7v؄:jā]' FܹMsnȣټKFmxs$ojayEM(3?,;3pgwo}/+GݱbkiEeafܒ[O'n͵b+zJ]*ɸ\ ((*ŵӷݍ fo%Yx7R>Q֢ ب|_Sơ!b9?WxkQߥAv&gv8|fuV`HzvrE_%,lZaf+ÃyP_Hgǥ~t]i(a-˖UY2A9.J6Gfk'/Yq&g@zs9|Q?S~샷'?Z#5&B o(ƭ5{E2zŪ@\G>`YWػ8uA)VL4EWG RwY%zhCٳHiJ 1=) RYZQ4FNSywʡ1pxIm~>$H [毘UHGP,ӹ$'^}Lҕt ,/N??ɾm3Iɜ=nk&.NC 2碟>k@t%qorsՉ=xw%#$穮%*H9^1驴yOfa>=23Rת (`|_r {Zkנv*O5'R4S`Tՙep)2vOoyVr/lъ V忈 ]ͦr^MZ^>{i.ȬJ=F$8|Y9ʎ:sJ:$6G?+}a)䊌N$R-&LN+NUH ;N5&wLmQq}b_y:E-ܧv }qK\I e#8ݻp$WRmB~K8EP3NCω'Rc'pU O $j1oŏҥo.3#]q۶OY׺`ZEˑwS)c뎔,vD^Ov6HUYiW8<@? Uv@~c]O/[lt'8s< ȮQ;1f]QŽH'{ULF3G|5rKDׁ1W+(bx`#9˟[tQeUS5#㋳L6E.doBx8{ ȅc ۈ0O?ּP'TTvsQzWIYuWD 3QͰc=Tjl(N\0MYAlYTo(݈8e>iZM޷Gq6ѩEa$PckGMlGHCY J>QS:35d07>8*?쏵~NnO^)Ұ) ճ.o#V?Ѫ3Vi:r1ʴFp yݬ-us8F'Z~S^#郌~h*$s JĂ8:+e=<Ne-}OATDi .:G#Kwh܀v>iI (eb;rD*$*Ɵ= jWߓZ6Uz*q ec= ,W~W#]l6Vr9{Vhm%)"r N-^Upz\Y&%a})4 U]t+n>ʌqNJTPkj.`uC_ky3>:l`?U]QϜFzR+:S=Cy*[W=Qɥ矗{%Q){d\duLRs#:b~nj6b>jitR]ʼd qMR-sclr+ѻFb# uW?? Z]IKc4jS!ku#RھETa@prg-Q^Q@Q@yGƿǭۮln\9^W{WQȬU#˧7NJH_^ҌOنASNb~^WG"Q/4jW;Dg g+q'i iMh!vE $t#R]ķ>g0dnUUkk0(tPڞH"I՘aq래|Ru<$ȼ*$(rcfKu,G=ՄM_WTIw>ҙ""< (~56?bk hwEmr IT*(R}WJatOV 8M(2)]H 6NqJ!@ $H"b{bXBv~ҽ; >IfC*.jxV[D۱d >~)|!@C9^]&NA 'F9-U ncuhvѭt%HP3ݏ=u5KLʴN0[yN1QVG&ۻE 4DQ@Q@Q@_- S3FyWk3nX1P߶}^ o:p-ZV`M~(ō܂QbQtf??ϓG0#;O5 ĀF@F 8\ۃʌ9w8)QztZGbY'?t(Qjͦ S{פj~͘XМb[hV-IXeZ-:,ⴊ9#" zWq'jz\LjzԣU4qܸ*DV,p*k}VdKE" ( ( ( ֡ڟQZ -/[ᛊ/##qz#'5݂M*} y2K9ֲ6^gǸKx&.sX4tŘRUyy5NH5 g24jEJaJE\i  @*KH T [hg5V>Viɚv1*є_}2Li95kR -v>ж @JzzխtFM]Ndq)B-t%cQLAEPEPEPEPEP-u(L8#u4Sri=ӳ<Yk{#$_SB+E}V&܁f U8uBJFTqDמ_|c> H5jaPjF8'*ᷞ)Brsޜ*άÌ#q}LBޓ)~ڍ!Tu&o$s!:U[+T34^i$\1'dDm]^E",z o USlR%H(rsraEUQI@ EPE%R3@ .hhrqֲmUd)2 0Lmcͻd ][3?WfSчU5k҉]އwo)\uW?:wǝ9DU/6їFlvׅȖG?e4ד{#qlW` E-/c.!tGi>ǑhA?W<!` ɯQNc Fr1U0t?Y(<*ɮ%ƞ:qK[`{Qb Bi♸Ӱ&3M>XdQS}E(''(#HM4,2Mn5r)j J JME1iƤi ❀Rz8Ɛ cʝQHQHi -LviOI vLL4Q&.7b5❀~j*)g endstream endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000321 00000 n 0000000358 00000 n 0000000493 00000 n 0000000589 00000 n 0000004199 00000 n 0000004311 00000 n 0000004418 00000 n 0000004534 00000 n 0000004662 00000 n 0000004775 00000 n 0000004901 00000 n 0000004990 00000 n 0000005118 00000 n 0000005227 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 16905 %%EOF Honey pots – trapping hackers « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Honey pots – trapping hackers

Apparently bears find honey irresistible and in the same way hackers can’t resist the challenge to gain access to a computer or system.

A  Honey pot is a computer system set up as a trap for hackers, crakers and scriptkiddies trying to gain unauthorised access to other people or a company’s computers or systems.  The trap is set up to detect, deflect and counteract unlawful usage of information systems.

The trap consists of a computer, data or a network site with valuable information for hackers and crackers. It appears to be part of a network, but in fact, runs completely isolated and is monitored and discreetly regulated.

Maintenance of a honey pot requires a large amount of attention and won’t necessarily guarantee a successful outcome. In some case it will only serve as a learning experience and hackers won’t necessarily be cornered.

A network of these traps set up in a production environment, is called a  honeynet. The term originated in 1999 from a paper by Lance Spitzner, founder of the Honeynet Project, called To build a Honeypot. (Read Spitzner’s interesting article here)

[SOURCES: http://searchsecurity.techtarget.com & www.wikipedia.org]

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.