CHAPTER 21

Deception: Next-Generation Honeypots

This chapter covers the topic of deception for defensive purposes. The chapter first covers deception in conflict from a historical perspective and then moves into the use of deception for protection of information systems using honeypots. The chapter provides many hands-on examples and explores the latest in deception and honeypot technologies.

In this chapter, we cover the following topics:

•   Brief history of deception

•   Honeypots as a form of deception

•   Open source honeypots

•   Commercial options

Brief History of Deception

Deception is as old as conflict. In fact, earlier than 800 bce, Sun Tzu, in his book The Art of War, said, “All warfare is based on deception.”1 A notable example ...

Get Gray Hat Hacking The Ethical Hacker's Handbook, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.