Hands-On Project – HoneyBOT®

User Generated

YNSYBS114

Computer Science

Description

HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned.

  1. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php.
  2. Click on the Download link in the left-hand menu.
  3. Click on the appropriate "here" link to download the latest version of HoneyBOT.
  4. Click Save.
  5. Select your downloads folder.
  6. Browse to your downloads folder.
  7. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.)
  8. Click Run, Next, I Accept, Next, Next, and Next.
  9. Check Create desktop icon.
  10. Click Next, Install, and Finish.
  11. Press the Start button or click File, and Start.
  12. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.)
  13. Click OK.
  14. Take a screenshot showing the total number of sockets loaded in the bottom status bar.
  15. Click Start.
  16. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.)
  17. When prompted for a username, enter your first name.
  18. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.)
  19. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.)
  20. Return to HoneyBOT and take a screenshot.
  21. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.)
  22. Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server.

Submit your Screenshots and answer the following questions:

  • What impact would more open ports have on the ability of your honeypot to attract hackers?
  • Can hackers tell that you have a honeypot running?
  • Do they have honeypots for spammers to keep them from harvesting emails from your webpages?
  • Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?

Your well-written paper should meet the following requirements:

  • Be 4 to 5 pages in length
  • Contain an illustrative table or a diagram created from properly cited external references
  • Include two credible external references in addition to the textbook
  • Formatted according to APA writing guidelines.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello buddy, the work has been completed but i couldn't take the screenshot with your first name and last name since you didn'y indicate your names please. And again I'm afraid with the IP addresses the Professor may know the work was not done by you since different countries have the first digits of an IP address unique. Anyway the rest of the work is perfectly done😊 In case of anything let me know .

Running head: Honeypots

Honeypots

Name
Instructor
Date

Running head: Honeypots
Impacts of more open ports on honeypots
Honeypots are bait systems aimed at trapping hacking and malicious activities on
systems. The reason for their success when deployed is because no one in the organization or
outside it would have a valid reason to access the systems on it. The discretion on the
deployment of these honeypots in organizations adds to their efficiency further.
Honeypot’s biggest challenge is that they make own logs only in their systems. More
Open ports can make Honeypots to be ineffective and explained in the following scenario. If a
hacker manages to gain access via a port on a particular website, the firewall won’t issue a
warning because the access was made via an already open port. Once the hackers manage to t...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags