a computer connected to the Internet in the hope that it will be hacked, enabling computer security researchers to capture tools and techniques used by hackers
a computer system or software intended to attract hostile activity such as cracking or spamming , by masquerading as a vulnerable system
a computer system that is configured to attract attackers attention by appearing like a vulnerable system
a decoy host that has no other function than to lure attackers in order to obtain a signature of the attack that can be used to stop it
a fake system designed to slow or confuse a scanner
a fake target that deters hackers from locating your real network
a form of deception employed to detect or confuse unauthorized attempts on information systems
a hardened host that masquerades as a vulnerable host for the purposes of observing crackers, and learning how they operate
a heavily instrumented machine or service, real or emulated, that is deployed in the hope that an attacker will attempt to break into it, actually break into it, or perform other illicit or unauthorized actions
a information gathering system, designed for attackers to interact with
an apparently vulnerable system deployed to be hacked
a network device that the institution uses to attract attackers to a harmless and monitored area of the network
an information system resource
a program, machine, or system put on a network as bait for attackers
a program that takes on the appearance of a service, a set of services, an entire operating system or even an entire network, but is in reality a tightly sealed compartment built to lure and contain an attacker
a resource who's value is in being probed, attacked or compromised
a sacrificial machine which is put on the Internet for the purpose of being exploited and broken into
a sacrificial system that's (usually) made vulnerable, and put on the net for nasty people to break into
a security resource whose value lies in being probed, attacked, or compromised
a server which attempts to attract attacks
a simply a system program or file that has absolutely no purpose in production
a site or resource that appears to be vulnerable in order to attract attention from attackers
a special computer system set up for the specific purpose of attracting hackers
a system designed to look like something that an intruder can hack
a system designed to teach system administrators how crackers probe for and exploit a system
a system that is prepared with well-known security risks to attract potential attackers, but is under full monitoring
a system that is put on a network with the intention that it can be probed and attacked, in order to gain information on an attacker
a system that is set up as a target--often configured to track all access and pretend to offer services so it appears more enticing
a system that pretends to be vulnerable, so as to attract attackers
a system that's put on a network so it can be probed and attacked
a system who's value is being probed, attacked, or compromised, you want the bad guys to interact with your honepyot
a term used to describe a cyber surveillance system
A server used to attract and trap spammers. Teergrube is the equivalent, which is the German word for tar pit. Similar terms include black hole and spam trap.
Programs that simulate one or more network services that you designate on your computer's ports. An attacker assumes you're running vulnerable services that can be used to break into the machine. A honeypot can be used to log access attempts to those ports including the attacker's keystrokes. This could give you advanced warning of a more concerted attack.
A system or network with known vulnerabilities which looks attractive to hackers, crackers, and other unwanted attacking guests. A honeypot serves no real purpose and have therefore no legitimate activity, so if someone tries to interact with it, it will most likely be unauthorized or malicious activity. The connection will be closely watched by honeypots admins who collect in-depth information that can expose new tactics and tools on how these unwanted guests work and can track them as well.
A decoy server set up to lure and trick an intruder. Designed to make hackers/crackers think they are on a valid production system. It is used to catch and stop an intruder or detect and track intruder techniques and test system vulnerability.
A system left open and unprotected to entice hackers to break into it. Usually this is done so that system administrators can monitor the methods used...
A computer put onto the internet to with the purpose of becoming infected with Malware and being exploited. The manner in which this occurs can then be researched and understood.
A system, or part of a system, purposely made to be enticing to an intruder or system cracker. Honeypots by and large have supplementary functionality and intrusion detection systems built into them in order to collect valuable information on the intruders. See also entrapment.
A computer system on the internet set up to attract and trap spammers and hackers. Usually this is a mailserver set up to appear to be an open relay.
In general, a system designed to look attractive to crackers and other undesirables. The crackers or whomever attack the honeypot while being carefully watched by the honeypot's admins. In spam terms: It's a mailserver set up to appear to be an open relay, but it really isn't. Ideally, a honeypot will relay the spammer relay tests, but it won't relay any actual spam that the spammers send, the actual spam just gets thrown away. In practice, it's iffy sorting out the relay tests from the actual spam.
A relatively unprotected computer, containing what appear to be important documents, that is attached to the Internet for the purpose of observing attacker behaviour.
A honeypot is a network resource that is intentionally left unprotected in order to attract malicious users and gather data about them.
Een systeem of netwerk met bepaalde zwakheden welke aantrekkelijk zijn voor hackers, crackers en andere niet gewenste personen. Een honeypot dient geen echt doel en is daardoor geen legitime activiteit. De verbinding wordt nauwgezet in de gaten gehouden door honeypots, welke uitgebreide informatie verzamelen om nieuwe taktieken en tools uiteen te zetten om deze niet gewenste personen te identificeren.
In computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.
In geography, a honeypot is a particularly popular visitor attraction within a managed tourist area, such as a national park. Examples include Bowness-on-Windermere in the Lake District, Bakewell in Derbyshire, Swanage, Box Hill on the North Downs of Surrey, Malham Cove in the Yorkshire Dales, and Old Faithful in Yellowstone National Park.
In espionage, a honeypot or honeytrap is a trap set to capture, kill or compromise an enemy agent using sex as the lure.