[deception toolkit http://www.all.net/dtk/]
> I like the idea of this thing but what happens if there's a bug in
> those scripts that fakes the vulnerabillities? Then couldn't it
> just be vulnerable too?
If you want your firewall to remain safe forward the deceptive ports
to a dedicated decepti
[deception toolkit http://www.all.net/dtk/]
> I like the idea of this thing but what happens if there's a bug in
> those scripts that fakes the vulnerabillities? Then couldn't it
> just be vulnerable too?
If you want your firewall to remain safe forward the deceptive ports
to a dedicated decept
You are correct. There is always a possibility of bugs. I normally always log
to a different machine so I have a record of activity that cannot be
erased. My
logging server will not allow a telnet or other network connecting, other than
syslog.
I normally connect from a hardwired serial conne
On Fri, Dec 22, 2000 at 11:41:23AM -0500, Larry Morrow wrote:
> I have not gone completely through the site to review it, but based on its
> stated purpose, it has great merit. TO answer your question, yes there
> is a point to running it on a firewalled box. Information is key. As a
> sysadmi
in real time with Instant Messenger: [EMAIL PROTECTED]
>
>-Original Message-
>From: Dave Adams [mailto:[EMAIL PROTECTED]]
>Sent: Friday, December 22, 2000 7:47 AM
>To: [EMAIL PROTECTED]
>Subject: I thought everyone would be interested in this
>
>
>Have any of you
everyone would be interested in this
Have any of you seen the Deception Tool Kit?
It's worth a read, very clever intrusion detection and hacker confusion, or
should i say nightmare ;-)
http://www.all.net/dtk/
let me know what you think of it, i'm going to put it on a couple of my
Have any of you seen the Deception Tool Kit?
It's worth a read, very clever intrusion detection and hacker confusion, or
should i say nightmare ;-)
http://www.all.net/dtk/
let me know what you think of it, i'm going to put it on a couple of my
servers to try out.
Dave Adams
M-Web Zimbabwe
--
7 matches
Mail list logo