Previous Page Next Page

Index


[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

handshake, TCP
Hard drives, searching victim's
hardexclude, LaBrea
Haxdoor
Haxplorer honeypot
Heap spraying technique
Heritrix 2nd
Hidden page faults 2nd
HideWindow executable, in mIRC-based bots
High-interaction client honeypots
     designing
     HoneyClient
     HoneyMonkey
     overview of
High-interaction honeypots
     advantages and disadvantages of 2nd
    Argos [See Argos.]
     defined 2nd
    Hybrid solutions [See Hybrid honeypot systems.]
     overview of
     physical honeypot implying
     safeguarding
    user-mode Linux [See UML (User-mode Linux).]
    VMWare [See VMware.]
High-interaction honeypots, detecting
     circumventing Honeynet logging
     Honeywall
     overview of
     QEMU
     Sebek
     UML
     VMware and other virtual machines
HipHop module, for PHP.PoP
History mode, Potemkin
Hitlist-based malware, detecting
Holy Father
HoneyBOT
HoneyC
     architecture
     built-in help for
     configuration of
     installation of
     overview of
HoneyClient
     detecting rootkits or Trojan horses with
     e-mail
     overview of
Honeycomb
Honeyd
     design overview
     detecting
     dynamic templates
     experimenting with
     features
     high-interaction honeypots and
     Honeycomb plug-in
     Honeydctl application
     Honeydstats analysis software
     installation and setup
     limitations of
     overview of
     packet-level logging
     performance
     protecting with Systrace
     Python Internal Services
     receiving network data
     routing topology
     runtime flags
     service-level logging
     services, emulating
     services, overview of
     subsytems
Honeyd, configuration
     add command
     advanced features for
     bind command
     create command
     delete command
     include command
     overview of
     set command
Honeydctl application 2nd
Honeydstats analysis software
HoneyMonkey 2nd
Honeynets
     circumventing logging
     defined
     high-interaction
     low-interaction
     minimizing risk of attacks on third-party systems
     virtual high-interaction, with UML
     virtual high-interaction, with VMware
Honeypots
    collecting malware [See Malware.]
     defined
    detecting high-interaction [See High-interaction honeypots, detecting.]
     detecting low-interaction
     detecting rootkits
     fingerprinting tools
     high-interaction
    hybrid [See Hybrid honeypot systems.]
     legal aspects of
    low-interaction [See Low-interaction honeypots.]
     overview of
     physical
     virtual
Honeytrap
     installation and configuration
     overview of
     running
Honeywall
     detecting
     installation of
     overview of 2nd
Hooking
     API
     System Service
Horde Application Framework vulnerabilities
Host kernel, UML
Host system
    Argos [See Argos.]
     defined
     taking contaminated hosts offline
    UML [See UML (User-mode Linux).]
    VMware [See VMware.]
Hot swap
Houseofdabus
HPOT_DATA log, Tiny Honeypot
hppfs
HTML vulnerability
     analyzing suspicious sites
     MS04-040 threat
     overview of
HTTP (HyperText Transfer Protocol)
     analyzing CWSandbox reports
     botnet setup using
     SDBot and variants using
HTTPS web service exploits
Hybrid honeypot systems
     building own
     Collapsar
     overview of
     Potemkin
     research summary of
     RolePlayer
HyperText Transfer Protocol [See HTTP (HyperText Transfer Protocol).]
-i (-device) interface, LaBrea installation
-i interface flag, tcpdump
-i interface runtime flag, Honeyd
-I (-my-ip-addr) octet.octet.octet.octet[/size], LaBrea installation

Previous Page Next Page