Hands-On Project – HoneyBOT®

Anonymous
timer Asked: May 8th, 2017
account_balance_wallet $9.99

Question Description

HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned.

  1. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php.
  2. Click on the Download link in the left-hand menu.
  3. Click on the appropriate "here" link to download the latest version of HoneyBOT.
  4. Click Save.
  5. Select your downloads folder.
  6. Browse to your downloads folder.
  7. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.)
  8. Click Run, Next, I Accept, Next, Next, and Next.
  9. Check Create desktop icon.
  10. Click Next, Install, and Finish.
  11. Press the Start button or click File, and Start.
  12. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.)
  13. Click OK.
  14. Take a screenshot showing the total number of sockets loaded in the bottom status bar.
  15. Click Start.
  16. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.)
  17. When prompted for a username, enter my first name. (First Name: Saleh)
  18. Enter your last name for the password. (Entering my first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.) (Last Name: Alnaim)
  19. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.)
  20. Return to HoneyBOT and take a screenshot.
  21. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.)
  22. Take a screenshot of the HoneyBOT log entry showing my first and last name being used to access an FTP server.

Submit the Screenshots and answer the following questions:

  • What impact would more open ports have on the ability of your honeypot to attract hackers?
  • Can hackers tell that you have a honeypot running?
  • Do they have honeypots for spammers to keep them from harvesting emails from your webpages?
  • Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?

The well-written paper should meet the following requirements:

  • Four pages in length
  • Contain an illustrative table or a diagram created from properly cited external references
  • Include two credible external references
  • Formatted according to APA writing guidelines.

Tutor Answer

Doctor_Ralph
School: University of Virginia

Attached.

Running head: HONEYPOT

1

Honeypot
Student Name
Professor Name
Course Title
Date

2
HONEYPOT
Honeypot
Honeypots are fake servers and artificial systems deployed alongside the main systems
with the intention of tricking hackers into hacking the false system. The principal value of a
honeypot is getting hacked (Zhuge et all,2007).Honeypots are one of the few methods used to
deceive attackers and study their behavior Organizations are increasingly using honeypots to
detect the presence of attackers. The defenders can observe the attackers safely where they do
little harm, and learn more about their tactics. Honeypots are used to learn attacker's methods to
fine tune the organization's defences appropriately.
Honeypot systems can be defined as decoy system setups or decoy servers that aim to
gather information about an intruder or an attacker into a system. This technology does not
replace other traditional security systems but is meant to be an additional level of security.
Honeypot technology is a valuable tool for researching new malware and attack (Zhuge et all,
2007). The technology aids in determining the types of vulnerabilities and attacks that exist and
allow the examination and identification of new vulnerabilities. Attackers and malicious coders
are aware of this technology and try their best to develop countermeasures of this technology.
However, security technologies keep building new and better honeypots.
A honeypot is a setup to be easy prey for attackers than actual production systems but
with system modifications so that their attacking activity can be logged and traced. Since
attackers always look for easy or s...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors