Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Gas Stations In the Bullseye
Newest First  |  Oldest First  |  Threaded View
SgS125
50%
50%
SgS125,
User Rank: Ninja
7/1/2015 | 9:58:39 AM
Invaluable information gained by honeypot intel
You can't really put a value to the information gained by knowing what your adversary is looking at, trying to find, or simply what tools are used against infrastructures.   It seesm silly that you would not want this intel.

It's not a bear you are coaxing in, its a small blind rodent who scampers around hiding from the light.  Honeypots allow us to gather the information needed to deter the next infestation of vermin.

If we all worked together and shared the intel from honeypots our defenses would have a power multiplier many times greater than the damm hidden zero day expoloits used to further the ill will of many unknown players.

So shine some light and watch the rats scatter,  you won't find a bear among them.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/30/2015 | 10:56:16 PM
Legion
Reminds me of the time I was walking down the street and I saw "We are legion" scrawled in chalk on the sidewalk.

Not as many style points for that one.  ;)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/30/2015 | 10:51:49 PM
Re: Poking the Bear
They're useful for their purposes, but good point that honeypots can create more risk.

Of course, if you can use the honeypot to then track the attacker down for swift justice -- effectively killing the bear, stuffing it, and displaying it at your home -- you potentially deter other bears.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/30/2015 | 10:53:22 AM
Re: Poking the Bear
I'm sure it is. Like everything it has its benefits as well as its detriments. There are multiple ideologies on this subject and can't say that any is more right than the other. It was just my opinion that bating criminals isn't always the best practice.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
6/30/2015 | 10:41:59 AM
Re: Poking the Bear
A honeypot is very useful as long as you know what you are doing. 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/30/2015 | 10:00:39 AM
Poking the Bear
I understand the utilization of honeypots and honeynets however I'm can't say I'm an advocate. It's like seeing a bear and instead of trying to scare it away with loud noises you lure it with honey into your basement to avoid it being in the main levels of your house or yard. Most likely you'll aggravate the bear/malicious intender and you run a higher risk of them messing up your house/network or worse.


44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9008
PUBLISHED: 2020-02-25
Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v9.1 allows users to inject arbitrary web script via the Tile widget in the People Tool profile editor.
CVE-2020-9018
PUBLISHED: 2020-02-25
LiteCart through 2.2.1 allows admin/?app=users&doc=edit_user CSRF to add a user.
CVE-2020-9019
PUBLISHED: 2020-02-25
The WPJobBoard plugin 5.5.3 for WordPress allows Persistent XSS via the Add Job form, as demonstrated by title and Description.
CVE-2020-9391
PUBLISHED: 2020-02-25
An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been ...
CVE-2020-8793
PUBLISHED: 2020-02-25
OpenSMTPD before 6.6.4 allows local users to read arbitrary files (e.g., on some Linux distributions) because of a combination of an untrusted search path in makemap.c and race conditions in the offline functionality in smtpd.c.