If we connect to a system, how can we determine whether the target system is a honeypot or a real system?
Or to put it in other words, , how to detect a honeypot?
Note: If this is not the correct forum to post this, please let edit or delete this post.
MVP (Enterprise Security), ISLA-2010 (ISC)², C|EH, C|HFI, CCNA, MCP,
Certified ISO 27001:2005 Lead Auditor
[b]There are 3 roads to spoil; women, gambling & hacking. The most pleasant with women, the quickest with gambling, but the surest is hacking - c0c0n