52
Proactive Detection of Security Incidents Honeypots Support: Poor The honeypot is not being developed nor maintained. The last release was in 2007. There is no active mailing list. Costs: High $$$ The toolkit is freely available as Open Source. Installation of HiHAT requires a significant amount of work: either installation of old versions of dependent software or modification of its source code. Setting up the web application to work as a honeypot can be time consuming. The tool is not maintained, therefore potential bugs will not be resolved. Usefulness for CERTs: Useful HiHAT provides valuable information on the attacks on websites; however, this comes at a significant effort.
Figure 9: HiHAT in operation (screenshot)