> -----Original Message----- > From: Michael Boman [mailto:[EMAIL PROTECTED] > Sent: Wednesday, 25 June 2003 2:03 a.m. > To: Rob Shein > Cc: 'John Public'; 'Larry Colen'; 'Brass, Phil (ISS > Atlanta)'; [EMAIL PROTECTED]; 'Lance Spitzner' > Subject: RE: Honeypot detection and countermeasures > > Seriously, would you pay big bucks for someone to run Nessus > against the > systems when you can just DIY such test yourself?
I had to comment on this ... Keep in mind that tools aren't everything as well! *Anyone* can probably run Nessus or ISS against your host, but can everyone read it's results? Can everyone point possible weaknesses in your security? _Of course not_, and that's why you hire external penetration testers who have experts for those fields. Regarding honeypots - as Lance said, there are many, many types of honeypots. Some are really easy to get into, while the other aren't. Regarding this thread, it's obvious that you can't get tools by only watching network traffic, but there are million other possibilities to deploy honeypots, which *can* get tools you need. I had a honeypot which had 2 network cards. One was connected to the Internet and the other one was connected to something what looked like a hardened server in a special DMZ. Now, after honeypot was compromised, attacker obviously wanted to get to that other server and he had to upload his tools to honeypot. This is just one example of possible deployment. YMMV. Best regards, Bojan Zdrnja --------------------------------------------------------------------------- Latest attack techniques. You're a pen tester, but is google.com still your R&D team? Now you can get trustworthy commercial-grade exploits and the latest techniques from a world-class research group. Visit us at: www.coresecurity.com/promos/sf_ept1 or call 617-399-6980 ----------------------------------------------------------------------------
