How to know if sites are using “honeypots” or not and is government sites are using it?
How to know if sites are using “honeypots” or not and is government sites are using it?
Share
Talk Programming , Career, Mental Health, Talk Personal Finance ❤️ Post a query and receive responses ✅
Post a query and receive responses. Ask anything, Ask Mitra ❤️
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Honeypot is designed primarily for tracking or attacking attackers during their attempts to break into an organization system. Attackers would try to detect the presence of honeypots on the network by propping services running on the system. These probs would include crafting malicious packets such as HTTPS, SMTPS, etc. For example. Ports that should a running service but deny a three-way handshake might indicate the presence of honeypot.
Attackers can also defeat honeypots by using multi-proxies (TORs) and hiding their conversations using encryption and steganography techniques. However, they are Some techniques used to identify and defeat the honeypots system