Ethical Hacking - Firewalls and Honeypot

A firewall is a network security device that monitors incoming and outgoing connections, for various rules and patterns, and filters the connections passing through them. The firewall can be implemented as hardware and software, or a combination of both.

Types of Firewalls -

  • Packet Filtering Firewalls

  • Circuit Level Firewalls

  • Application Firewalls

  • Stateful Firewalls

A honeypot is a computer or computer system that is deliberately made for trapping hackers or tracking unconventional or new hacking methods. It is isolated in a way that only attackers can probe it with the intent of compromising the system. Once the attacker connects to the honeypot, the honeypot records all events and activities performed by the attacker. This helps the system administrator learn more about how the attacker compromised the system and then accordingly strengthen the security of other real systems within the network.

Based on the deployment, honeypots may be classified as -

  • Production Honeypots

  • Research Honeypots

 Similarly, Honeynet is a network form consisting two or more honeypot. honeynet is used for monitoring a larger and/or more diverse network in which one honeypot may not be sufficient.