Lirik Lagu Sinopsis Film Gaya Hidup
Blackberry LG Mobile Nokia Samsung Sony Ericsson
Klasemen L.Italia Klasemen L.Inggris Jadwal Liga Italia Jadwal Liga Inggris
Kare Kambing Pasar Turi
Handphone-PDA Elektronik komputer-Perangkat Lunak
jasa Rent Car jasa pembuatan website Jasa Fotografi jasa pembuatan desain grafis
Movie Musik movie Box office musik Terlaris
Sunday, October 17, 2010 | 3:33 AM | 0 Comments

Study Hacker 01

Mission of our research honeypot

-To create a realistic incident response
environment
-Detect an attack and compromise
-Examine the evidence left by both
-Fully understand the chain of events
-Identify the hacker (or get as close to him as
possible)


What is a Research Honeypot?

-A system or group of systems specifically deployed for
the purpose of observing a hacker probe, attack and
exploit network services
-Must have traffic capture abilities
-Must maintain control over outbound network traffic
(attacks)
-The system should be identical to a production system
in every possible way
-Should be as weak or as strong as you want the
hacker to be
-You must be able to quickly and effectively isolate the
system before a successful intruder can attack others


Our Research Solution


-Linux PCs running apache web servers
-OpenBSD layer 2 bridge
-Packet Filter FW
-Snort NIDS
-AIDE file system integrity application
-Tcpdump
-Ethereal protocol analyzer


The Servers
-Default but patched installations
-RedHat Linux 6.2 (the lower bar)
-RedHat Linux 7.0 (the higher bar)
-Neither showed vulnerable services when
scanned with the Nessus vulnerability scanner
-Default apache web page showing
-All devices time synchronized using NTP

0 comments:

Post a Comment

 
Copyright Sarang Ilmu © 2010 - All right reserved - Using Blueceria Blogspot Theme
Best viewed with Mozilla, IE, Google Chrome and Opera.