Hands-On Project – HoneyBOT®

Question Description

HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned.

  1. Download HoneyBOT from
  2. Click on the Download link in the left-hand menu.
  3. Click on the appropriate "here" link to download the latest version of HoneyBOT.
  4. Click Save.
  5. Select your downloads folder.
  6. Browse to your downloads folder.
  7. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.)
  8. Click Run, Next, I Accept, Next, Next, and Next.
  9. Check Create desktop icon.
  10. Click Next, Install, and Finish.
  11. Press the Start button or click File, and Start.
  12. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.)
  13. Click OK.
  14. Take a screenshot showing the total number of sockets loaded in the bottom status bar.
  15. Click Start.
  16. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was
  17. When prompted for a username, enter my first name. (First Name: Saleh)
  18. Enter your last name for the password. (Entering my first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.) (Last Name: Alnaim)
  19. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.)
  20. Return to HoneyBOT and take a screenshot.
  21. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.)
  22. Take a screenshot of the HoneyBOT log entry showing my first and last name being used to access an FTP server.

Submit the Screenshots and answer the following questions:

  • What impact would more open ports have on the ability of your honeypot to attract hackers?
  • Can hackers tell that you have a honeypot running?
  • Do they have honeypots for spammers to keep them from harvesting emails from your webpages?
  • Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?

The well-written paper should meet the following requirements:

  • Four pages in length
  • Contain an illustrative table or a diagram created from properly cited external references
  • Include two credible external references
  • Formatted according to APA writing guidelines.

Final Answer


Running head: HONEYPOT


Student Name
Professor Name
Course Title

Honeypots are fake servers and artificial systems deployed alongside the main systems
with the intention of tricking hackers into hacking the false system. The principal value of a
honeypot is getting hacked (Zhuge et all,2007).Honeypots are one of the few methods used to
deceive attackers and study their behavior Organizations are increasingly using honeypots to
detect the presence of attackers. The defenders can observe the attackers safely where they do
little harm, and learn more about their tactics. Honeypots are used to learn attacker's methods to
fine tune the organization's defences appropriately.
Honeypot systems can be defined as decoy system setups or decoy servers that aim to
gather information about an intruder or an attacker into a system. This technology does not
replace other traditional security systems but is meant to be an additional level of security.
Honeypot technology is a valuable tool for researching new malware and attack (Zhuge et all,
2007). The technology aids in determining the types of vulnerabilities and attacks that exist and
allow the examination and identification of new vulnerabilities. Attackers and malicious coders
are aware of this technology and try their best to develop countermeasures of this technology.
However, security technologies keep building new and better honeypots.
A honeypot is a setup to be easy prey for attackers than actual production systems but
with system modifications so that their attacking activity can be logged and traced. Since
attackers always look for easy or s...

Doctor_Ralph (20248)
University of Virginia

The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

The tutor was knowledgeable, will be using the service again.

Awesome quality of the tutor. They were helpful and accommodating given my needs.


Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors