Hands-On HoneyBOT

Anonymous
timer Asked: Dec 27th, 2018
account_balance_wallet $35

Question description

HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.ph...

See the attached document for directions.

Hands-On – HoneyBOT® HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine. In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php 1. 2. 3. 4. 5. 6. Click on the Download link in the left-hand menu. Click on the appropriate "here" link to download the latest version of HoneyBOT. Click Save. Select your downloads folder. Browse to your downloads folder. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.) 7. Click Run, Next, I Accept, Next, Next, and Next. 8. Check Create desktop icon. 9. Click Next, Install, and Finish. 10. Press the Start button or click File, and Start. 11. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.) 12. Click OK. 13. Take a screenshot showing the total number of sockets loaded in the bottom status bar. 14. Click Start. 15. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.) 16. When prompted for a username, enter your first name. 17. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.) 18. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.) 19. Return to HoneyBOT and take a screenshot. 20. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.) 21. Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server. Submit your Screenshots and answer the following questions: a) What impact would more open ports have on the ability of your honeypot to attract hackers? b) Can hackers tell that you have a honeypot running? c) Do they have honeypots for spammers to keep them from harvesting emails from your webpages? d) Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior? The content of the paper must be seven to ten pages in length and formatted according to the APA Requirements. A minimum of six references with in-text citations. Please, also consider the following sources for the project: • Corporate computer security (4th ed.). Upper Saddle River, NJ: Pearson Education. By Boyle and Panko (2015) • Improving network security with honeypots. Retrieved from www.project.honeynet.org/papers/individual/Mastersthesis_Doering.pdf • There’s More to Honeypots Than Wasting Hackers’ Time. Retrieved from https://www.webtitan.com/blog/honeypots-how-far-can-you-go-in-wasting-a-hackerstime/

Tutor Answer

Doctorjims
School: Rice University

Hello, I am through with the work. Have a look at it. Thank you.

Running Head: HONEYPOTS

1

Honeypots
Name of Student
Name of Professor
Course Title
Date

HONEYPOTS

2
Honeypots

The need to keep the network safe and secured is highly needed nowadays, especially with
the growth in the attacks numbers. According to Grimes (2005), Honeypots is windows based
interaction solution. Basically, Honeypot makes a protected environment to interact and capture
with unwanted network traffic. A honeypot is a best and easy solution for network security studies
or as part of an early warning intrusion detection system (IDS). The logging ability of a honeypot
is far more than some other system security tools and catches raw packet level data even including
the keystrokes and errors made by attackers. Honeypots are becoming one of the main tools for
security to monitor the latest exploits and tricks of hackers by recording the hackers move so the
security society can more quickly to respond to the new exploits. According to Danchenko,
Prokofiev and Silnov (2017), the technology of honeypot is seamless for analysts, as it adds lots
of benefits such as; the expressive usage need; easy installation, conf...

flag Report DMCA
Review

Anonymous
Posted this and got four bids within 15 minutes. Clearly lots of tutors on the platform, quality was pretty legit too.

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors