Let's say I have an SSH server.
How would I go about turning it into a honeypot in order to hide the real one?
So for example someone sees port 22 is open and they try to get inside and if they do succeed they instead access a honeypot which seems to be the real one or instead just collects some sort of fingerprint from them or even both .?
My question is;is it possible (I'm almost sure it is),is it too difficult and finally how would one go about doing such thing,or find the information to do so.
Thank you in advance,TJ.
[link] [comments]
from hacking: security in practice https://ift.tt/3COEPb6
Comments
Post a Comment