Previous Page Next Page

2.6. Summary

In this chapter, we introduced the concept of virtual high-interaction honeypots. These honeypots are conventional computer systems like an ordinary PC system or a router. They are are equipped with additional software that constantly collects information about all kinds of system activity. This data greatly aids in post-incident computer and network forensics. High-interaction honeypots allow us to learn in-depth information about attacks. We have showed how to configure different kinds of virtual high-interaction honeypots and how to set up a virtual high-interaction honeynet. You should now be able to set up such a honeynet at home and then collect information about attacks on the Internet.

Previous Page Next Page