Skip to content

Learning

Looking to start your career in IT ?

2 Topics 7 Posts
  • Honeypot Data Capture

    Solved
    3
    1 Votes
    3 Posts
    263 Views

    @jbarber1976 just thinking a little more about this in terms of how to structure such a honeypot. The real issue here is that the honeypot itself will only be useful if the source IP is correct - for example, not hidden behind a VPN or reverse proxy.

    In this case, the information you’d gain would be useless as it would only direct you to the VPN host, and not the actual perpetrators, which of course, is the primary goal.

    I’d need more information to be able to comment further.

  • Studying

    4
    1 Votes
    4 Posts
    394 Views

    @jac I’d be interested to know how this pans out and which route you decide to take