Author: M.Prince (20 Jun 07 12:45pm)
Assuming you're unlikely to have any human visitors mistyping your URLs, it probably can't hurt to point *.php pages at your honey pot. Just visiting the honey pot will get an IP in our database. If the IP hits enough distinct honey pots in a short enough period of time, we will mark it suspicious.
Along similar lines, one of the alpha features of the http:BL Apache module that we're playing with is a way to allow web admins to automatically report the 404s they receive back to Project Honey Pot. Our thought was, similar to yours, that we could find the IPs that were looking for exploits. Gathering that data and sharing it can keep malicious computers off sites.
Thanks for your help!
|