Point of order: To be a honeypot the vulnerability would have 
to be on a system that served no other purpose, despite what 
ISS would have you believe.
 
Cory Altheide
Computer Forensics Specialist
NNSA Cyber Forensics Center
[EMAIL PROTECTED]
 
> > -----Original Message-----
> > From: Myers, Marvin [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, July 24, 2003 11:44 AM
> > To: Jennifer Bradley; [EMAIL PROTECTED]
> > Subject: RE: Re: [Full-Disclosure] morning_wood should stop
> > posting xss
> > 
> > 
> > Jennifer,
> >    Did you ever think that there is even the slightest possibility 
> > that the wood has done this on purpose? Have you never heard of a 
> > honey-pot. Some people in this world do have the ability to learn by

> > observing others. So now I guess you are calling all of the 
> > honey-pot and honey-net operators moron's. Did you hear that Lance??

Consider then the concept of a 'Honey Token'
http://securityfocus.com/infocus/1713


Thanks for your time,

[EMAIL PROTECTED]
"Got TANG?"

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to