Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Tarpit

Posted on by

Tarpits are computer systems that are used to absorb and delay incoming connections and sessions from an attacker. Tarpits doesn’t prevent cyber security attacks instead they listen and engage with the attacker but respond slowly. This makes the attacker efforts ineffective.

Types of Tarpits

Layer 7 Tarpits engage with Layer 7 Applications requests of HTTP & SMTP and delay their responses. Web Application attacks like XSS, CSRF and Email Attacks like SPAM are slowed down by Layer 7 Tarpits.

Layer 3/4 Tarpits engage with Layer 3 and 4 connections. DoS/DDoS attacks are slowed down by Layer 3/4 Tarpits.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme