If virtual machines are relatively easy for an attacker to detect, the next best thing might be to put so much honey in your honeypot, attackers won't be able to resist. Which actions would result in the most meaningful traffic on your honeypot?
If virtual machines are relatively easy for an attacker to detect, the next best thing might be to put so much honey in your honeypot, attackers won't be able to resist. Which actions would result in the most meaningful traffic on your honeypot?
Creating directories and files with appealing names, giving the server a tempting name, and creating user accounts that resemble a production environment will likely attract more meaningful traffic to the honeypot. These actions make the honeypot appear valuable and legitimate, enticing attackers to engage and attempt to exploit it while providing rich data on their tactics, techniques, and procedures.
C is correct. Purpose of honeypots/honeynets is to gather info about attackers TTPs (and catch them of course, but this question state "Which actions would result in the most meaningful traffic", which means that this honeypot is dedicated to gathering TTPs). Option C has the most hardened honeypot and the attacker would need give their best and reveal their TTPs in order to bypass system described in option C.