Honey Buckets?
Well I was talking to a friend of mine about various subjects. Him having a degree in applied computer science I ask alot of questions. lol. The other day he started talking about honey buckets. No not the ones you sit on and take a crap but a Box that you conect to the internet and leave vunerable. The idea is to get people to attack your computer with dangerous programs, the Box then saves these programs in a way so that they can be used, or studdied, by you latter.
I googled it but didn't find much of anything… just, outhouse companys mostly. I'm not sure how one of these works, anyone know? Or is there a different name for these? Thanks, ~Kep
actually the idea is mainly used for distraction purposes.
example: you setup a fake SSH login with simple passes as a honey pot, so someone will try the easist open and want to brute force the SSH login, instead of working out a apache 0-day exploit etc. then once they break into the SSH login you've collected all their details so you can report them or ban them etc.
thats basically the princible of a honey pot.