i

Website Penetration Testing

Honey Pots and Security Misconfiguration

Honey Pots : A honeypot is a network-attached system set up as a attraction for cyberattackers to find, deflect or study hacking attempts. In order to gain unauthorized access to information systems. The main purpose of a honeypot is to show itself on the internet as a vulnerable for attackers it may be a server or other high-value target. Honeypot are used to hardened operating systems and are usually configured so that they appear to offer attackers exploitable vulnerabilities. The cost of honeypot is very high because honeypot need specialized person for configuration,operating and maintainting

Security Misconfiguration : Security Misconfiguration occur when Security settings of any firewall or any security system are defaults or admin are not able to set a good,strong rule for sewcurity. Strong security needs a secure configuration defined and deployed for the application, web server, database server, and platform.