Question Description

HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned.

  1. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php.
  2. Click on the Download link in the left-hand menu.
  3. Click on the appropriate "here" link to download the latest version of HoneyBOT.
  4. Click Save.
  5. Select your downloads folder.
  6. Browse to your downloads folder.
  7. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.)
  8. Click Run, Next, I Accept, Next, Next, and Next.
  9. Check Create desktop icon.
  10. Click Next, Install, and Finish.
  11. Press the Start button or click File, and Start.
  12. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.)
  13. Click OK.
  14. Take a screenshot showing the total number of sockets loaded in the bottom status bar.
  15. Click Start.
  16. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was
  17. When prompted for a username, enter your first name.
  18. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.)
  19. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.)
  20. Return to HoneyBOT and take a screenshot.
  21. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.)
  22. Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server.

Submit your Screenshots and answer the following questions:

  • What impact would more open ports have on the ability of your honeypot to attract hackers?
  • Can hackers tell that you have a honeypot running?
  • Do they have honeypots for spammers to keep them from harvesting emails from your webpages?
  • Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?

Your well-written paper should meet the following requirements:

  • Be two to four pages in length
  • Contain an illustrative table or a diagram created from properly cited external references
  • Include two credible external references in addition to the textbook
  • Formatted according to APA writing guidelines.

Tutor Answer

School: University of Virginia

Hey I am through. Please find the correct answer in the attached word file. Thank you.

Running Head: HONEYPOTS








Honeypots are usually computer security mechanisms set up to detect or attract cyber
attackers or hackers to study and counteract attempts to gain unauthorized access to information
systems. A honeypot contains data that simulates what appears to be a real system and any attempts
to access the honeypot are considered hostile. This provides valuable information on the types and
level of security threats that the system or network might face. The technology used in setting up
honeypots is convenient for analysts, as it has lots of advantages such as easy installation,
operation, and configuration and can gather meaningful information (Danchenko, 2017).

Impact more open ports have on the ability of the honeypot to attract hackers

The main point of using a honeypot is to attract attacks from hackers so that you can
intercept and identify them before they to do damage your crucial server and machines. Therefore,
opening more ports in honeypot creates multiple decoys for the hackers, and this gives you an
opportunity to identify an attack before it gets to your main server. This will happen as the attacker
will try to ac...

flag Report DMCA

Solid work, thanks.

The tutor was great. I’m satisfied with the service.

Goes above and beyond expectations !

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors