[ Date Index ] [ Thread Index ] [ <= Previous by date / thread ] [ Next by date / thread => ]
jody salt wrote:
I have an idea.... I don't know if its been done already - but it would be cool if you could have some sort of fake ssh login that would log you in a fake computer system if you get the wrong password, you could then have secret command (specified in a configuration file) that you could use to verify that you have actually logged in correctly. This would completly ruin these sort cracking attempts, as the malware used will have no way of knowing if it was a genuine success i.e. it will always seem like a success. You could then log all the commands etc used, and build a profile of the cracker - whats commands they use and what files they try to upload etc... It must of been done already?? Any thoughts? Cheers Jody
I think it's called a honeypot, but I'm not sure if there's any particular software to do this for you, or if you have to set it up yorself. I think it would be cool if someone did this though...
-- 140cf42384f90b8c349b67457b907115 Public PGP key at http://apolloenterprises.org/stuff/morefiles/publicpgpkey.txt -- The Mailing List for the Devon & Cornwall LUG Mail majordomo@xxxxxxxxxxxxx with "unsubscribe list" in the message body to unsubscribe. FAQ: www.dcglug.org.uk/linux_adm/list-faq.html