Shubham's blog

unnamed

Well with the help of honeypot, you can easily monitor your own OS and can track every activity of the hacker or you can say that its the best way to hack the hacker. Every big company is already using smart honeypots in their backends like Google, Facebook and Microsoft because they don’t want to compromise. They actually want to trace all the activities of all the users and if they found any illegal or malicious activity found then honeypot has the capability to block that IP address immediately.

Types of Honeypots –

Honeypots can be categorized by two ways i.e. on the basis of deployment and on the basis of design criteria.

a) Basis of Deployment

  • Production Honeypot
  • Research Honeypot

b) Basis of Design Criteria

  • Pure Honeypot
  • High-Interaction Honeypot
  • Low-Interaction Honeypot

How to set a honeypot in Kali Linux

As you all know Kali Linux is one…

View original post 378 more words

Thank you so much

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s