Test your honeypots and see how much effort it takes to identify and categorize them.
We provide different services with regards to ICS honeypots, from black-box fingerprinting, identification and detection, to white-box code and design audits and consultation.
Our research and expertise in this area enables us to develop undetectable ICS honeypots.
We can consult you on how to design your honeypot or other tools to mimic ICS sensors more accurately.
Using Scadapot framework, you have all the principles needed for detecting ICS honeypots.
The research resulting into the Scadapot framework has also resulted in advancement of open-source and proprietary state-of-the-art application security tools, such as OWASP Honeypot and OWASP Nettacker.
The OWASP Honeypart project uses our Honeymax technology to power itself.
Using Scadapot framework, an alternative, harder to detect Gaspot was created as part of OWASP Honeypot.
We have implemented our research in a simple framework, and demonstrated it by creating a Gaspot alternative that is harder to detect as part of the OWASP Nettacker.
Scadapot is an ICS Honeypot framework, enabling detection and identification of improperly configured ICS honeypots as well as development of undetectable ICS honeypots. Scadapot has been used in several open source and commercial projects, and has been presented in technical ICS gatherings such as Kaspersky ICS Conference.Read more
Honeypots are once again in the news. If you stopped by the Watchguard booth at last month’s RSA Conference in San Francisco, chances are good that you connected with one of its Wifi hotspots. Those hotspots were there to log how many people would try to connect to an open network. Watchguard found that the […]
Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? One way […]
The honeypot took the form of a fake financial company with weak security, and it was discovered and breached by bots almost instantly. The team monitored the intruders to gain some interesting insight into how attackers are using bots – with one notable example entering the network within 2 hours and performing 80% of the […]