Jump to content

Recommended Posts

According to one of my colleagues in the  IT business, the concept of a "honey pot" is the creation of a secondary login, often intentionally less secure than the normal login, which acts as low-hanging fruit for potential intruders and basically grants them "root" access... to a fake account/database. (Perhaps even automatically redirecting from the real login page to the fake one, via detecting from a list of fake passwords.)

This way, the real owner of the account or server can not only throw any would-be intruders off their scent, but also monitor, trace (attempt to identify), or even deliberately annoy the culprit with a wide assortment of different tools. Even the password itself could be a form of identifier, if you use an assortment of multiple fake passwords, as all logins with a specific fake password would be isolated from the other fake logins.

Should Malwarebytes for Business have any utilities for setting up "honey pot" type stuff, like I propose? And if so, how could one expand on this? What sorts of things would you want to monitor when somebody uses a fake login, and what utilities would you want at your disposal to intentionally annoy any attackers who fall for it?

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.