Risk Associated with Specter

As a low-interaction honeypot, Specter offers no real operating system for the attacker to control and interact with. It is extremely difficult for the attacker to exploit the honeypot’s emulated services and use the honeypot to attack, harm, or infiltrate other systems or organizations. The greatest risk that Specter introduces is to the underlying operating system. You must ensure that best practices are followed to secure the operating system on which the honeypot will be installed. As such, you most likely want to install the honeypot on a secured Windows operating system. Here are some excellent sources on security Microsoft-based operating systems.

http://www.microsoft.com/security

http://www.sans.org

http://www.securityfocus.com/microsoft ...

Get Honeypots: Tracking Hackers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.