Book Image

Penetration Testing with Raspberry PI

Book Image

Penetration Testing with Raspberry PI

Overview of this book

Table of Contents (14 chapters)
Penetration Testing with Raspberry Pi
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Rogue access honeypots


A honeypot in computer terminology is a trap designed to detect, deflect, or mislead the attempts to compromise a computer system or network. The typical honeypot is a computer, piece of data, or network segment that appears to be part of the real network, no matter how isolated and/or monitored the network is. Most honeypots present themselves as being vulnerable and containing something of value to lure attacks away from the real target.

There are typically two types of honeypots. The more commonly used one is a production honeypot that is designed to be part of a network defense strategy. A production honeypot typically means placing honeypots inside the network with the goal of luring hackers that have breached other defenses, which means that production honeypots are the last effort to prevent sensitive systems from being compromised.

The other type of honeypot is a monitoring honeypot, which is typically placed on a network to research data that passes through...