Frequently Asked Questions

We have the answers to your questions.

Why Honeypots in 2024?

Honeypots are a great concept and have been exposing hackers in networks since kindergarten.

They are a crucial part of any security strategy. Yet, too few companies utilize Honeypots, despite their effectiveness. This is partly due to the maintenance effort involved and the fact that existing open-source solutions are often too easily detectable by hackers.

SentryBox solves this issue, eliminating additional administrative overhead while maintaining a very good cost-security ratio.

Can't hackers easily detect the SentryBox?

"My data is secure because it is in the cloud!"

We often hear this statement from customers who host their business in the cloud. It's like installing the best lock and then sticking the key to the front door. Certainly, the risk can be shifted from the local network to the cloud through cloud hosting. However, access to the data is still through a local network. This could be a LAN/WLAN or even a VPN connection.

If a hacker gets into this network and captures the VPN credentials or SSH keys to the cloud servers, they also have direct access to the data in the cloud. To keep the attack surface as small as possible, it is necessary to also secure the local network.

Every system is only as secure as the weakest part. To keep the attack surface as small as possible, it is advisable to also secure the local network.

How long does the installation take?

In just 5 minutes, SentryBox is installed. Unpack, connect, and choose your preferences.

Now SentryBox is up and running, disguising itself as a device on the network. It provides SSH login, web servers with admin panels, serves files, and monitors for port scans.

I don't get that. Please explain again briefly.

The SentryBox is connected to the internal company network. It masquerades as an inconspicuous network device, which can be configured beforehand. Typically, it might appear as a router, a backup station, a Linux device, or a Windows PC. While you sip your Frappuccino and focus on your work, the SentryBox lurks, waiting for attackers.

A hacker who has infiltrated the network is now attempting to take it over gradually and search for valuable data. They come across an enticing dataset on a backup device and log in. Unfortunately, it turns out to be the SentryBox, and the incident has now been reported.

Now not only do we know there's a problem, but also which computer the attacker has already compromised.

Can't I do that myself with open source on Friday afternoon?

Yes, that's correct. Unfortunately, setting up the honeypot is just the beginning. You need reliable hardware, regular software updates, implementation of notifications, and checks to ensure the device remains online.

Most open-source solutions typically offer limited protocols and don't simulate a complete device, making them easier to detect. With SentryBox, there's no hassle—just plug in, choose a personality, and you're done.

Can hackers simply detect the SentryBox?

To detect the SentryBox, the hacker must interact with it. Tools like Nmap are typically used for fingerprinting, which already triggers an alarm—meaning it's too late for the attacker.

With many SentryBoxes distributed across the network and configured differently, it's like playing Minesweeper on the highest difficulty level for the hacker.

Not finding your question? Then ask us!

Ask Question