
The honeynet becomes a useful tool as one analyzes the data gathered from it to build new security into their system. The objective of a honeynet is to attract malicious attackers, study their offensive strategy, and track every movement they make. It defines the purpose of the honeypot, the basic component of a honeynet, as "an information system resource whose value lies in unauthorized or illicit use of that resource". The Honeynet Project is the open source contribution of computer security professionals focused on making the Internet community a more aware and safer place. Next, connect the hub to the network by plugging in a network cable from it to the Then plug the target’s network cable into hub, and plug in another cable connecting analyzer. Once hardware is available, go to the switch the target device resides on and unplug the target from the network. In order to hub out, we need a hub and a few network cables. Many people think of hubbing out as cheating, but it’s really a perfect solution in situations where we can’t perform port mirroring but still have physical access to the switch the target device is plugged into. Hubbing out is a technique in which localize the target device and analyzer system on the same network segment by plugging them directly into a hub. Hubbing Out Another very simple way of capturing the traffic through a target device on a switched network is by hubbing out.

Some switch manufacturers allow to mirror multiple ports to one individual port, which may be very useful when analyzing the communication between two or more devices on a single switch. When port mirroring, be aware of the throughput of the ports which are mirrored.

Port mirroring allows to expand visibility window on a switched network.
