Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Honeypot

Posted on by

Honeypots are decoy system that are placed in infrastructure to attract and deflect attackers. Honeypots simulate and look like real system having applications and services running on it with vulnerabilities intentionally being kept open which makes it as a trap and lures the attackers towards it.

Honeynet is collections of Honeypots.

Types of Honeypots

Production Honeypots are honeypots used in production environment to deflect attackers from ligitimate systems.

Research Honeypots are honeypots used for research to understand threact actors and cyber security attacks.

Honeypot deployment types

Low-Interaction Honeypots are honeypots that simulate limited services.

Medium-Interaction Honeypots are honeypots that simulate real operating systems, application and services.

High-Interaction Honeypots are honeypots that emulate real application and services of an organization.

Pure Honeypots are honeypots that emulate real production infrastructure compromising of systems, network, application and services of an organization.

Types of Honeypots based in technology

Malware Honeypots – Attracts malwares like virus, worms, trojan horse.

Email Honeypots – Attracts malicious and suspicious emails.

Spider Honeypots – Attracks web crawlers.

Database Honeypots – Attracts database attacks like SQL injects

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme