Home page logo
/

Honeyd

Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Honeyd enables a single host to claim multiple addresses on a LAN for network simulation. It is possible to ping the virtual machines, or to traceroute them. Any type of service on the virtual machine can be simulated according to a simple configuration file. It is also possible to proxy services to another machine rather than simulating them. It has many library dependencies, which can make compiling/installing Honeyd difficult. For downloads and more information, visit the Honeyd homepage.

Popularity #124, 44
Rating ★ (1)
Latest release 1.5c
May 27, 2007
(10 years ago)
Homepage/Download
Wikipedia
Outdated/incomplete?
★★★★★ 
 0%
★★★★ 
 0%
★★★ 
 0%
★★ 
 0%
★ 
 100%

Comments

no rating Ausar Bluhd

I have had this program running in FreeBSD where i ported it in preety easily. the configuration was a bit odd, however i looked up sample config files and instantly had 20 virtual computers on my network that seemed real. very neccisary for any defense on a network as when scanned by metasploit the faux computers seemed very real. the biggest goal for me was to watch thr logs in real time as the machines where attacked, i couldnt get that working but i spent less thrn 10 hours trying.

RL

The tool appears to be outdated and to be abandoned. The forums are loaded with spam. It requires older libraries that are getting difficult to find.

Your comment

Along with your rating, you can use the comment form to post a review, tutorial, tips and tricks, or anything else others will find useful. If you develop this software (or work for the company), please don't rate it. You may leave a clarifying comment as long as you state your affiliation and don't specify a star rating (just leave it as “No rating”).

 
 
  (will not be shown, will not be spammed)
(At least 50 characters. No markup is allowed. URLs will be made into links.)
 Which does not belong: buffer overflow, format string, sql injection, flux capacitor, cross-site scripting (antispam)

Feed for updates.

Home

[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]