Stealth VM Oct 06 2008 07:20AM
Stuart Gilchrist-Thomas (stuartpaulthomas gmail com)

Does anyone have any pointers to evidence or advice on hiding or reducing the detection of VM honey pots. I know of temporal issues e.g. Timing metrics can give away a VM, and that you can manually alter peripheral identities e.g. virtual network cards etc.
I've also created a company to purchase ip and hosting space to ensure a form of identity in depth. But I still lack experience in preventing detection. Can you help? Are you my only hope? ;)

Many thanks.

Sent whilst mobile.

-original message-
Subject: Re: Honeypot VMs
From: pinowudi <pinowudi (at) gmail (dot) com [email concealed]>
Date: 06/10/2008 00:13



Jason Lewis wrote:
> Are there any honeypot VM resources? I've seen the SPARSA one, but the
> link is dead.
> jas

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus