Specter: a commercial honeypot solution for Windows

Wednesday, 9 April 2003, 1:32 PM EST

This is the third installment in an ongoing series of articles looking at honeypots. In the first two papers, we discussed the OpenSource honeypot Honeyd, how it works, and a deployment in the wild. In this paper we will look at a different honeypot, the commercially supported solution Specter.

Similar to Honeyd, Specter's primary value is detection. However, that is where the similarities end, these two honeypots are different as night and day. Many of Honeyd's strength's are Specter's weaknesses, just as many of Honeyd's weaknesses are Specter's strengths. This is why these two honeypots make for such an excellent comparison. Keep in mind that, as true with most honeypots, neither is better then the other, it all depends on what you are looking for.

[ Read more ]

Related items




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //