Mailinglist Archive


Defeating Honeypots: System Issues, Part 2
From:Joe Klemmer
Date: Mon, 25 Apr 2005 21:30:47 -0400

Defeating Honeypots: System Issues, Part 2
by  Thorsten Holz and Frédéric Raynal
last updated April 6, 2005

Introduction

This paper will explain how an attacker typically proceeds in order to 
attack a honeypot for fun and profit. In part one we compared honeypots 
to steganography and then looked at three common techniques for 
virtualizing honeypots. For each of these methods, which included User 
Mode Linux, VMware environments, and chroot/jail environments, we looked 
at weaknesses that lead to their detection. It was made clear that while 
each of these have their advantages, they can all be easily detected by 
an experienced hacker.

http://www.securityfocus.com/infocus/1828?ref=rss