Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Sep 2004 21:12:52 -0700
From:      "Ted Mittelstaedt" <tedm@toybox.placo.com>
To:        <m.hauber@mchsi.com>, <freebsd-questions@freebsd.org>
Subject:   RE: Tar pitting automated attacks
Message-ID:  <LOBBIFDAGNMAMLGJJCKNCEEIEPAA.tedm@toybox.placo.com>
In-Reply-To: <200409091144.00787.m.hauber@mchsi.com>

next in thread | previous in thread | raw e-mail | index | archive | help


> -----Original Message-----
> From: owner-freebsd-questions@freebsd.org
> [mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Mike Hauber
> Sent: Thursday, September 09, 2004 8:44 AM
> To: freebsd-questions@freebsd.org
> Subject: Re: Tar pitting automated attacks
> 
> 
> How difficult would it be to have a "dummy" system setup on 
> the LAN where incoming SSH could be transparently routed 
> to.  In fact (and even the idea gives me the creeps), how 
> difficult would it be to change "root" to something else, 
> and then create a dummy root account.  I mean, if one is 
> attempting to get a cracker to waste his time, then why not 
> wet his whistle and let him think he's actually getting 
> somewhere?
> 
> I don't know anything about this kind of thing (I'm just not 
> devious enough, I guess).  How should I go about googling 
> this to learn more?  Is there a term for it?
> 

search the term "honeypot servers"

Ted



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?LOBBIFDAGNMAMLGJJCKNCEEIEPAA.tedm>