What is Honeypot?
Honeypots can be arranged and in light of their deployment(use/activity) and level of association. In light of deployment, honeypots can be delegated
1. Production honeypots
Production honeypots are put inside the production network with other production servers by an association to enhance their general condition of security.
Typically, production honeypots are low-collaboration honeypots, which are less demanding to convey. they give fewer data about the attacks or attackers than research honeypots.
2. Research honeypots
These honeypots don’t increase the value of a particular association; rather, they are utilized to inquire about the dangers that associations confront and to figure out how to better ensure against those dangers.
Research honeypots are unpredictable to send and keep up, catch broad data and are utilized basically by research, military, or government associations.
How To set up Honeypot in Kali Linux:
Some open-source tools like this one prove very helpful if we talk about increasing security for our systems.
What’s your opinion about this tool? let us know in the comment box. Also, if you face any problem regarding the installation of this tool, feel free to leave a comment below.
|Haven't found the solution or are you having an unknown error? Join HackTalkForum.com to start a discussion or join a discussion on it.|