Date: Thu, 9 Sep 2004 21:12:52 -0700 From: "Ted Mittelstaedt" <tedm@toybox.placo.com> To: <m.hauber@mchsi.com>, <freebsd-questions@freebsd.org> Subject: RE: Tar pitting automated attacks Message-ID: <LOBBIFDAGNMAMLGJJCKNCEEIEPAA.tedm@toybox.placo.com> In-Reply-To: <200409091144.00787.m.hauber@mchsi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> -----Original Message----- > From: owner-freebsd-questions@freebsd.org > [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Mike Hauber > Sent: Thursday, September 09, 2004 8:44 AM > To: freebsd-questions@freebsd.org > Subject: Re: Tar pitting automated attacks > > > How difficult would it be to have a "dummy" system setup on > the LAN where incoming SSH could be transparently routed > to. In fact (and even the idea gives me the creeps), how > difficult would it be to change "root" to something else, > and then create a dummy root account. I mean, if one is > attempting to get a cracker to waste his time, then why not > wet his whistle and let him think he's actually getting > somewhere? > > I don't know anything about this kind of thing (I'm just not > devious enough, I guess). How should I go about googling > this to learn more? Is there a term for it? > search the term "honeypot servers" Ted
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?LOBBIFDAGNMAMLGJJCKNCEEIEPAA.tedm>