In-Reply-To: <[EMAIL PROTECTED]> So far in every pen test I've conducted most of the addressing information was known up front. So if I ran into a honeypot or honeynet, it was just part of the overall equation. The clients were interested in what I could hack into and what vulnerabilities were present and needed to be closed. They weren't interested in paying me or my company $$ to waste time on whether I could evade a honeypot or not. It wasn't a test of my abilities, but of their security posture at that moment in time.
And always remember, the only dumb question is the one you don't ask. How are you ever going to learn without reading, trying and asking questions. >Received: (qmail 30138 invoked from network); 17 Jun 2003 21:20:34 -0000 >Received: from outgoing2.securityfocus.com (205.206.231.26) > by mail.securityfocus.com with SMTP; 17 Jun 2003 21:20:34 -0000 >Received: from lists.securityfocus.com (lists.securityfocus.com [205.206.231.19]) > by outgoing2.securityfocus.com (Postfix) with QMQP > id 30AB08F284; Tue, 17 Jun 2003 15:21:30 -0600 (MDT) >Mailing-List: contact [EMAIL PROTECTED]; run by ezmlm >Precedence: bulk >List-Id: <pen-test.list-id.securityfocus.com> >List-Post: <mailto:[EMAIL PROTECTED]> >List-Help: <mailto:[EMAIL PROTECTED]> >List-Unsubscribe: <mailto:[EMAIL PROTECTED]> >List-Subscribe: <mailto:[EMAIL PROTECTED]> >Delivered-To: mailing list [EMAIL PROTECTED] >Delivered-To: moderator for [EMAIL PROTECTED] >Received: (qmail 31148 invoked by uid 0); 17 Jun 2003 19:52:04 -0000 >Date: Tue, 17 Jun 2003 15:03:17 -0700 >From: Larry Colen <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] >Subject: Honeypot detection and countermeasures >Message-ID: <[EMAIL PROTECTED]> >Mime-Version: 1.0 >Content-Type: text/plain; charset=us-ascii >Content-Disposition: inline >User-Agent: Mutt/1.2.5i > >I'm doing some research on honeypot detection, and preventing >honeypots from being detected. I'd greatly appreciate some feedback >from pen-testers on the following issues: > >Do you worry about being detected by honeypots? > >When you do a pen-test, do you already know of the existence of >honeypots, and their location, so that it is an easy matter to avoid >them? > >If you are concerned about honeypots, how do you test to see if the >system under attack is a honeypot or a production machine? > >Thanks, > Larry > > > >--------------------------------------------------------------------------- >Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the >world's premier technical IT security event! 10 tracks, 15 training sessions, >1,800 delegates from 30 nations including all of the top experts, from CSO's to >"underground" security specialists. See for yourself what the buzz is about! >Early-bird registration ends July 3. This event will sell out. www.blackhat.com >---------------------------------------------------------------------------- > > --------------------------------------------------------------------------- Latest attack techniques. You're a pen tester, but is google.com still your R&D team? Now you can get trustworthy commercial-grade exploits and the latest techniques from a world-class research group. Visit us at: www.coresecurity.com/promos/sf_ept1 or call 617-399-6980 ----------------------------------------------------------------------------
