Honeypots
Stealth VM Oct 06 2008 07:20AM
Stuart Gilchrist-Thomas (stuartpaulthomas gmail com) (3 replies)
Re: Stealth VM Apr 06 2009 09:44AM
Dante Signal31 (dante signal31 gmail com)
Re: Stealth VM Nov 06 2008 12:19PM
Javier Fernandez-Sanguino (jfernandez germinus com) (1 replies)
Stuart Gilchrist-Thomas dijo:
> Hi,
>
> Does anyone have any pointers to evidence or advice on hiding or
> reducing the detection of VM honey pots. I know of temporal issues
> e.g. Timing metrics can give away a VM, and that you can manually
> alter peripheral identities e.g. virtual network cards etc. I've also
> created a company to purchase ip and hosting space to ensure a form
> of identity in depth. But I still lack experience in preventing
> detection. Can you help? Are you my only hope? ;)

Why hide the fact that the honeypot is running on VM? After all, many
environments in production (@datacenters) are running over VM. Those
intruders that think that VM == honeypot will change their mindset soon.

Regards

Javier

[ reply ]
RE: Stealth VM Nov 06 2008 09:54PM
Michael Owen (mowen costco com) (1 replies)
Re: Stealth VM Nov 07 2008 06:28AM
Stuart Thomas (stuartpaulthomas gmail com)
Re: Stealth VM Oct 06 2008 11:52AM
Michael Bailey (mibailey eecs umich edu)


 

Privacy Statement
Copyright 2010, SecurityFocus