Skip to main content

Featured

Honeypot & its Types

Honeypot & its Types: Honeypot is a security mechanism which records all the actions, transactions and interactions with users. They are used to track the attackers and defend the attacks. Based on their deployment types, it is classified into – Production honeypots –  Easy to use but they capture only limited information. They are placed inside production networks to improve security. Research Honeypots -Works better in gathering information about attackers. They research the threats of the organization and tries to prevent the threats. These are complex to deploy and maintain. Based on design criteria, the honeypots are classified into – Pure honeypots – Activities are monitored using the honeypot’s installed link to the network. High interaction – Multiple honeypots in a single system. More secure, difficult to detect, expensive to maintain. Low interaction – Simulate the services of attackers.

Maintaining Access

Maintaining Access:

Once you gain access to the system using various password cracking methods, the next step is to maintain the access in the system. To remain undetected, one has to secure the presence. To secure the hacker can install a hidden infrastructure to keep access of backdoor open. Trojan horses, covert channels and rootkits are used. A trojan horse provides access at application level, used to gain remote access. A covert channel is where the data can be sent through secret communication tunnels. A rootkit is a malware type which hides itself from the system, they conceal to bypass the computer security measures.

Popular Posts