Chapter 8. Client Honeypots
8.1 Learning More About Client-Side Threats
8.2 Low-Interaction Client Honeypots
8.3 High-Interaction Client Honeypots
8.4 Other Approaches
Since we see more and more attackers exploiting holes in client programs (e.g., via vulnerabilities in Microsoft’s Internet Explorer or Office programs), the functions of honeypots must evolve further. In this chapter, we introduce a new application of honeynets to deal with this threat. This application is based on the original idea of honeypots, but it develops it further in another direction. This cannot be done without leaving the boundaries given by the original approach: We now completely omit the passive methodology given by classical honeypots, as introduced ...