SentryBox has been discontinued. Thank you for being part of the journey — learn more in our blog post
We have the answers to your questions.
Honeypots are a great concept and have been exposing hackers in networks
since kindergarten.
They are a crucial part of any security strategy. Yet, too few companies
utilize Honeypots, despite their effectiveness. This is partly due to the maintenance effort involved and
the fact that existing open-source solutions are often too easily detectable by hackers.
SentryBox
solves this issue, eliminating additional administrative overhead while maintaining a very good
cost-security ratio.
"My data is secure because it is in the cloud!"
We often hear this
statement from customers who host their business in the cloud. It's like installing the best lock and then
sticking the key to the front door. Certainly, the risk can be shifted from the local network to the cloud
through cloud hosting. However, access to the data is still through a local network. This could be a
LAN/WLAN or even a VPN connection.
If a hacker gets into this network and captures the VPN
credentials or SSH keys to the cloud servers, they also have direct access to the data in the cloud. To
keep the attack surface as small as possible, it is necessary to also secure the local network.
Every system is only as secure as the weakest part. To keep the attack surface as small as
possible, it is advisable to also secure the local network.
In just 5 minutes, SentryBox is installed. Unpack, connect, and choose your
preferences.
Now SentryBox is up and running, disguising itself as a device on the network. It
provides SSH login, web servers with admin panels, serves files, and monitors for port scans.
The SentryBox is connected to the internal company network. It masquerades
as an inconspicuous network device, which can be configured beforehand. Typically, it might appear as a
router, a backup station, a Linux device, or a Windows PC. While you sip your Frappuccino and focus on
your work, the SentryBox lurks, waiting for attackers.
A hacker who has infiltrated the network is
now attempting to take it over gradually and search for valuable data. They come across an enticing
dataset on a backup device and log in. Unfortunately, it turns out to be the SentryBox, and the incident
has now been reported.
Now not only do we know there's a problem, but also which computer the
attacker has already compromised.
Yes, that's correct. Unfortunately, setting up the honeypot is just the
beginning. You need reliable hardware, regular software updates, implementation of notifications, and
checks to ensure the device remains online.
Most open-source solutions typically offer limited
protocols and don't simulate a complete device, making them easier to detect. With SentryBox, there's no
hassle—just plug in, choose a personality, and you're done.
To detect the SentryBox, the hacker must interact with it. Tools like Nmap
are typically used for fingerprinting, which already triggers an alarm—meaning it's too late for the
attacker.
With many SentryBoxes distributed across the network and configured differently, it's
like playing Minesweeper on the highest difficulty level for the hacker.