Honeypot Introduction (Cyber Security Series)

Поділитися
Вставка
  • Опубліковано 29 вер 2024
  • Support Silicon Dojo at:
    www.donorbox.o...
    www.silicondojo...
    Honeypot Introduction
    What is a Honeypot
    A decoy system or device used to get a hacker to expose themselves
    Many Products are Available
    Part of an Intrusion Detection System
    Honeypot Strategy
    Do you have current problems/ concerns?
    Surveillance IS NOT SECURITY
    What happens when you detect an issue?
    Create Very Visible and “Hidden” Servers
    Look for Vulnerabilities You Don’t Have
    Track Any Access Attempts
    Even Pings can be tracked
    SSH
    Remote Desktop
    FTP
    Log Files
    Log Files are your documentation of what has happened on your network
    Parsing log files from multiple servers and devices can give you a better view of an intrusion event
    Trigger events based on log files
    Notifications
    Dynamic Firewall Rules
    Harden Your Honey Pot
    A hacker taking control of your Honeypot would be sad :(
    Verify security on your Honeypot is adequate
    Wipe and Reload Honeypots periodically
    Choosing a Honeypot

КОМЕНТАРІ • 34

  • @MikeJones-dr8os
    @MikeJones-dr8os 3 роки тому +7

    Thanks Eli, I knew of the honeypot but you provided very good info and great examples of how to use them. Yes I learned some stuff, thanks again.

  • @МаркоКраљевић-ю5р
    @МаркоКраљевић-ю5р 3 роки тому +7

    Eli please do a video about counter intelligence!!!

  • @trippyfierce9759
    @trippyfierce9759 2 роки тому

    17:02 wait loic still works ?😂😂

  • @KDG111
    @KDG111 3 роки тому +1

    Love your content over several years. There’s no doubt you know what you’re talking about. However, do you need to been so smug and tiptoeing to the line of being condescending?. When you are teaching you’re very compelling and insightful. But those snarky comments in every other sentence is a little distracting from the talent you have in teaching and disseminating information.

  • @drwblkfact7286
    @drwblkfact7286 2 роки тому

    Eli is one big troll. He is the only computer science guy that just talk about the subject{other than that one Asian guy that keep crying about how his wife left him} instead of showing you how to build the project.... He just just goes on and on with the technological jargon. Its like being a kid and hearing what s#x is like over and over until ur off in college actually doing what ppl been talking your head off about.. just a waste of time

  • @eliinthewolverinestate6729
    @eliinthewolverinestate6729 3 роки тому +3

    Water holes and low hanging fruit are predators favorite places to hunt. Like watching a deer chase apples falling from the tree. I learn so will move build better blind to get a shot. Then wait for a windy day. No baiting here, but can hunt natural food plot. We have had wifi issues, but not on the wired devices. I didn't think I had a problem till now. Yeah I should set up a game camera to watch the apple tree. I was hunting 2 apple trees and pear tree, but other apple tree was fruitful. If you can't get a good shot don't take it. And of coarse I am out with bow or muzzle loader. I suggest looking up laws first and know what your hunting for. Gotta have the right tools for the right animal.

  • @TurbineResearch
    @TurbineResearch 3 роки тому +6

    " empowers you to do whatever the hell it is you want to do " hahaha this why I love your content! Keep it up

  • @gjcarter2
    @gjcarter2 2 роки тому +1

    Honeypot: A magical place where I meet Pooh Bear and his friends! We talk about all sorts of things and play hide and seek!

  • @nick-pu4zae
    @nick-pu4zae Рік тому +1

    ♥️

  • @urgencepc4563
    @urgencepc4563 2 роки тому +2

    You seem like a great dude Eli. You're definitely on my ''to fund'' list when budget will allow...

  • @trippyfierce9759
    @trippyfierce9759 2 роки тому +2

    Damn this guy is a great teacher unlike most ppl on UA-cam

  • @LandonMusic-mr2tn
    @LandonMusic-mr2tn 2 місяці тому

    This is a really good video thank you for making it.

  • @brhanudegene5037
    @brhanudegene5037 3 роки тому +1

    please share your slides plus additional documents

  • @tbwoytbizzy4799
    @tbwoytbizzy4799 Рік тому

    well explained

  • @ClementAndre
    @ClementAndre 3 роки тому +1

    txh foe t3e video!

  • @manthing1467
    @manthing1467 3 роки тому +1

    Love to see you getting back to your roots, great content

  • @UmairAli
    @UmairAli Рік тому

    3:03 hahah ♥ that's somewhat similar to my style when i am talking to my friends about it :D

  • @50shadesofbeige88
    @50shadesofbeige88 2 роки тому

    This is a good idea, I mean.. the honey pot obviously, but mainly the format.

  • @trip3pro856
    @trip3pro856 11 місяців тому

    can you please do a video how to detect and distinguish honeypot from a real computer/system ?

  • @brandonfarfan1978
    @brandonfarfan1978 3 роки тому

    Wow! This lesson was short.😲
    I know a few things about honeypots, but I learned a few new things from this lesson. Thanks.👍

  • @agratefulheart512
    @agratefulheart512 Рік тому

    Gr8 Info

  • @fbifido2
    @fbifido2 3 роки тому

    Can you show "How to deploy a honeypot" "How to know when it got hack" "What to do next" ???

  • @markbrown8097
    @markbrown8097 2 роки тому

    And I thought a honeypot was used to entrap those with security clearances.

  • @markbrown8097
    @markbrown8097 2 роки тому

    But Eli coding is SO BORING! LOL

  • @chrisnameless8325
    @chrisnameless8325 3 роки тому

    The other reason they wait is so they can infect the backups.

  • @sb8449
    @sb8449 2 роки тому

    Commenting for the engagement - love your content!

  • @Gman01010010
    @Gman01010010 2 роки тому

    It puts the honey on its network

  • @RoyerAdames
    @RoyerAdames 2 роки тому

    High quality content

  • @or251j
    @or251j 3 роки тому

    Kudos Eli!!

  • @kabandajamir9844
    @kabandajamir9844 2 роки тому

    So nice

  • @truthminister5828
    @truthminister5828 3 роки тому

    Good stuff