Тёмный

Honeypot Introduction (Cyber Security Series) 

Eli the Computer Guy
Подписаться 1,1 млн
Просмотров 18 тыс.
50% 1

Support Silicon Dojo at:
www.donorbox.o...
www.silicondojo...
Honeypot Introduction
What is a Honeypot
A decoy system or device used to get a hacker to expose themselves
Many Products are Available
Part of an Intrusion Detection System
Honeypot Strategy
Do you have current problems/ concerns?
Surveillance IS NOT SECURITY
What happens when you detect an issue?
Create Very Visible and “Hidden” Servers
Look for Vulnerabilities You Don’t Have
Track Any Access Attempts
Even Pings can be tracked
SSH
Remote Desktop
FTP
Log Files
Log Files are your documentation of what has happened on your network
Parsing log files from multiple servers and devices can give you a better view of an intrusion event
Trigger events based on log files
Notifications
Dynamic Firewall Rules
Harden Your Honey Pot
A hacker taking control of your Honeypot would be sad :(
Verify security on your Honeypot is adequate
Wipe and Reload Honeypots periodically
Choosing a Honeypot

Опубликовано:

 

6 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@MikeJones-dr8os
@MikeJones-dr8os 3 года назад
Thanks Eli, I knew of the honeypot but you provided very good info and great examples of how to use them. Yes I learned some stuff, thanks again.
@TurbineResearch
@TurbineResearch 3 года назад
" empowers you to do whatever the hell it is you want to do " hahaha this why I love your content! Keep it up
@trippyfierce9759
@trippyfierce9759 2 года назад
Damn this guy is a great teacher unlike most ppl on RU-vid
@urgencepc4563
@urgencepc4563 2 года назад
You seem like a great dude Eli. You're definitely on my ''to fund'' list when budget will allow...
@eliinthewolverinestate6729
@eliinthewolverinestate6729 3 года назад
Water holes and low hanging fruit are predators favorite places to hunt. Like watching a deer chase apples falling from the tree. I learn so will move build better blind to get a shot. Then wait for a windy day. No baiting here, but can hunt natural food plot. We have had wifi issues, but not on the wired devices. I didn't think I had a problem till now. Yeah I should set up a game camera to watch the apple tree. I was hunting 2 apple trees and pear tree, but other apple tree was fruitful. If you can't get a good shot don't take it. And of coarse I am out with bow or muzzle loader. I suggest looking up laws first and know what your hunting for. Gotta have the right tools for the right animal.
@manthing1467
@manthing1467 3 года назад
Love to see you getting back to your roots, great content
@МаркоКраљевић-ю5р
@МаркоКраљевић-ю5р 3 года назад
Eli please do a video about counter intelligence!!!
@Yuri-bt4wl
@Yuri-bt4wl 3 года назад
OH NO!! A RUSSIAN HACKER!!!!!!!!!!! \ö/
@МаркоКраљевић-ю5р
@МаркоКраљевић-ю5р 3 года назад
@@Yuri-bt4wl Dam it xD
@brandonfarfan1978
@brandonfarfan1978 3 года назад
Wow! This lesson was short.😲 I know a few things about honeypots, but I learned a few new things from this lesson. Thanks.👍
@gjcarter2
@gjcarter2 2 года назад
Honeypot: A magical place where I meet Pooh Bear and his friends! We talk about all sorts of things and play hide and seek!
@50shadesofbeige88
@50shadesofbeige88 2 года назад
This is a good idea, I mean.. the honey pot obviously, but mainly the format.
@sb8449
@sb8449 2 года назад
Commenting for the engagement - love your content!
@brhanudegene5037
@brhanudegene5037 3 года назад
please share your slides plus additional documents
@UmairAli
@UmairAli Год назад
3:03 hahah ♥ that's somewhat similar to my style when i am talking to my friends about it :D
@trip3pro856
@trip3pro856 11 месяцев назад
can you please do a video how to detect and distinguish honeypot from a real computer/system ?
@markbrown8097
@markbrown8097 2 года назад
And I thought a honeypot was used to entrap those with security clearances.
@LandonMusic-mr2tn
@LandonMusic-mr2tn 2 месяца назад
This is a really good video thank you for making it.
@chrisnameless8325
@chrisnameless8325 3 года назад
The other reason they wait is so they can infect the backups.
@fbifido2
@fbifido2 3 года назад
Can you show "How to deploy a honeypot" "How to know when it got hack" "What to do next" ???
@tbwoytbizzy4799
@tbwoytbizzy4799 Год назад
well explained
@RoyerAdames
@RoyerAdames 2 года назад
High quality content
@nick-pu4zae
@nick-pu4zae Год назад
♥️
@agratefulheart512
@agratefulheart512 Год назад
Gr8 Info
@ClementAndre
@ClementAndre 3 года назад
txh foe t3e video!
@Gman01010010
@Gman01010010 2 года назад
It puts the honey on its network
@or251j
@or251j 3 года назад
Kudos Eli!!
@kabandajamir9844
@kabandajamir9844 2 года назад
So nice
@truthminister5828
@truthminister5828 3 года назад
Good stuff
@KDG111
@KDG111 3 года назад
Love your content over several years. There’s no doubt you know what you’re talking about. However, do you need to been so smug and tiptoeing to the line of being condescending?. When you are teaching you’re very compelling and insightful. But those snarky comments in every other sentence is a little distracting from the talent you have in teaching and disseminating information.
@trippyfierce9759
@trippyfierce9759 2 года назад
17:02 wait loic still works ?😂😂
@markbrown8097
@markbrown8097 2 года назад
But Eli coding is SO BORING! LOL
@drwblkfact7286
@drwblkfact7286 2 года назад
Eli is one big troll. He is the only computer science guy that just talk about the subject{other than that one Asian guy that keep crying about how his wife left him} instead of showing you how to build the project.... He just just goes on and on with the technological jargon. Its like being a kid and hearing what s#x is like over and over until ur off in college actually doing what ppl been talking your head off about.. just a waste of time
Далее
Layered Network Introduction (Cyber Security Part 5)
1:28:02
Cyber Security Introduction (Cyber Security Part 1)
2:07:08
Epic Reflex Game vs MrBeast Crew 🙈😱
00:32
Просмотров 2,9 млн
What are Honeypots, and How to Avoid Them.
10:52
Просмотров 403 тыс.
Patch Management Introduction (Cyber Security Part 6)
1:15:15
What is a Subnet Mask
59:56
Просмотров 17 тыс.
The FBI Ran a "CP" Website...
25:21
Просмотров 1,7 млн
you need this FREE CyberSecurity tool
32:06
Просмотров 1,2 млн
What is a Firewall
1:07:55
Просмотров 13 тыс.
What is a Jump Box (or Bastion Host)?
12:34
Просмотров 34 тыс.
What is Ethernet
1:22:25
Просмотров 16 тыс.
Epic Reflex Game vs MrBeast Crew 🙈😱
00:32
Просмотров 2,9 млн