News: Honeynet Project's 'honey pot' a sweet success in trapping ha...

Advisories

Discover Organizations/Events News

Honeynet Project's 'honey pot' a sweet success in trapping hacker attacks

During just one month of monitoring, the Honeynet team's "honey pot," which poses as a real network to attract hackers, had been scanned by hundreds of unique IP addresses looking for two particular ports: UDP (User Datagram Protocol) port 137, used . . .
During just one month of monitoring, the Honeynet team's "honey pot," which poses as a real network to attract hackers, had been scanned by hundreds of unique IP addresses looking for two particular ports: UDP (User Datagram Protocol) port 137, used by the NetBIOS Naming Service, and TCP port 139, the tried-and-true NetBIOS Session Service. This should not surprise loyal Security Watch students, who know that these ports, which are the Achilles' heels of Windows 9x/ME computers, turn users into "easy @Home and DSL victims."

Knowing the proliferation of Windows 9x systems on the Internet and admitting more than idle curiosity about hackers targeting Windows systems (the Honeynet Project has been a mostly non-Microsoft entity until recently), the team decided to build a default Windows 98 system with the entire C: drive shared to the world -- hoping the "black-hat" bad guys would come. And come they did.

The link for this article located at InfoWorld is no longer available. 

 

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.