Index
[
A
] [
B
] [
C
] [
D
] [
E
] [
F
] [
G
] [
H
] [
I
] [
K
] [
L
] [
M
] [
N
] [
O
] [
P
] [
Q
] [
R
] [
S
] [
T
] [
U
] [
V
] [
W
] [
X
] [
Y
] [
Z
]
Vanderpool (VT)
Variable expansion, Honeyd
Versions, VMware
Virtual filesystem, nepenthes
Virtual honeypots
advantages and disadvantages
connecting to Internet
creating
defined
Virtual machine monitor [See
VMM (virtual machine monitor)
.]
Virtual machines
[See also
.vmx files
.]
analyzing spyware on Internet with
Collapsar architecture
detecting
Potemkin architecture
virtualization vs. emulation of
Virtual networks
setting up with Argos
setting up with UML
setting up with VMware
Virtual PC
Virtual system
Virtualization software [See
VMware
.]
Virusscan, CWSandbox
Visitor, HoneyC
VMM (virtual machine monitor)
detecting presence of
overview of
Potemkin using
vmnet
VMTN (VMware Technology Network)
VMware
adding monitoring software
building virtual high-interaction honeynet
combining with Honeyd
connecting virtual honeypot to Internet
creating virtual honeypot
detecting
overview of
preventing detection of
setting up virtual high-interaction honeypot
setting up virtual honeypots
2nd
versions of
virtual network with
VMware ESX Server
VMware Fusion
VMware GSX Server
VMware Player
creating virtual honeypot for VMware
overview of
setting up virtual honeypot
VMware Technology Network (VMTN)
VMware Workstation
2nd
VMwareServer
creating virtual honeypot for VMware
installation and setup for
overview of
.vmx files
creating virtual honeypot for VMware with QEMU
preventing detection of VMware
virtual machine format
VPN tunnel, deploying nepenthe
VT (Vanderpool)
vuln-*.conf, nepenthes
Vulnerabilities
[See also
Botnets
;
Client-side threats
;
Microsoft
;
Windows
.]
Horde Application Framework
ptrace in Linux
2nd
search engines for finding
in XAMPP
Vulnerability modules
defined
detecting nepenthes remotely
example of
implementing
overview of
results of