Can hackers tell that you have a honeypot running

Assignment Help Computer Engineering
Reference no: EM131322737

Hands-On Project - HoneyBOT

HoneyBOT is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine.

In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned.

1. Download HoneyBOT from https://www.atomicsoftwaresolutions.com/honeybot.php.

2. Click on the Download link in the left-hand menu.

3. Click on the appropriate "here" link to download the latest version of HoneyBOT.

4. Click Save.

5. Select your downloads folder.

6. Browse to your downloads folder.

7. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.)

8. Click Run, Next, I Accept, Next, Next, and Next.

9. Check Create desktop icon.

10. Click Next, Install, and Finish.

11. Press the Start button or click File, and Start.

12. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with "192.168" or it could be a typical IP address.)

13. Click OK.

14. Take a screenshot showing the total number of sockets loaded in the bottom status bar.

15. Click Start.

16. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.)

17. When prompted for a username, enter your first name.

18. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don't really have an FTP server running. It's being "faked" by HoneyBOT.)

19. Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.)

20. Return to HoneyBOT and take a screenshot.

21. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.)

22. Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server.

Submit your Screenshots and answer the following questions:

• What impact would more open ports have on the ability of your honeypot to attract hackers?
• Can hackers tell that you have a honeypot running?
• Do they have honeypots for spammers to keep them from harvesting emails from your webpages?
• Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior?

Directions:

• Be three pages in length, not including the screenshot or title or reference pages.
• Include three credible external references in addition to the textbook
• Contain an illustrative table or a diagram created from properly cited external references
• Do not use I, We, They ....
• Your paper must follow APA style guidelines, as appropriate .
• Citations for every sentences.
• Not plagiarized ( we check that with turnitin.com).

Reference no: EM131322737

Questions Cloud

Similarities and differences of organizations : For the purposes of this assignment, select 2 hospitals on the Web that are in the same city or area. They should both be acute-care community hospitals of similar bed sizes, but 1 should be managed by a religious order. Review the Web information..
Project equivalent annual cost : A five-year project has an initial fixed asset investment of $350,000, an initial NWC investment of $38,000, and an annual OCF of −$37,000. The fixed asset is fully depreciated over the life of the project and has no salvage value. If the required re..
Write a paper about how to recruit in at workplace : Write a paper based on the following points:Characteristics of Millenials in the Workplace.How to recruit, select, and keep Millenials engaged in the workplace?Is your company prepared to deal with Millennials? Would you make any changes in your cur..
Financial trends for healing hands hospital chief financial : Submit a 700-word paper outlining the financial trends for Healing Hands Hospital's chief financial officer and team, and include the following:
Can hackers tell that you have a honeypot running : What impact would more open ports have on the ability of your honeypot to attract hackers? Can hackers tell that you have a honeypot running?
Basis of segmentation as applied in television marketing : The right marketing mix can be adopted only after segmentation. Elucidate with examples the basis of segmentation as applied in Television Marketing?
Define consumer behavior : Define Consumer Behavior and describe its relation in purchase decision making?
Employ to encourage the parents or caregivers : Taking into account the parents' and caregivers' potential sensitivities, list at least three specific questions you would ask about the child to gather more information. Provide at least two strategies you could employ to encourage the parents or..
Does entitlement appear to mediate effects of narcissism : After entitlement was entered in Step 1 of the regression equation, entitlement accounted for 3% of the variance in rage when it was entered in Step 2. Does entitlement appear to mediate the effects of narcissism on rage?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Prepare the project work breakdown structure and resource

you are a small project management consulting company called big-proj that is looking for that big break. you are one

  What historical data might be useful

What additional measures would have to be made for projects A and B to determine which of the teams eliminated errors more efficiently? What metrics would you propose to help in making the determination?

  How to compare and contrast monitoring of patient vital sign

the Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing.

  Defined the derivative of the gaussian function

E27: Computer Vision Spring 2016 - HOMEWORK 3. The partial derivative of a Gaussian is separable. Let G→(x, y) be defined as the derivative of the Gaussian function with respect to x: G→(x, y) = (∂/∂x)G(x, y)

  Write a program that uses a bag of strings to keep track

if you know how to read and write strings from a file,then have the program obtain its initial list of chores from a file. When the program ends, it should write all unfinished chores back to the file.

  Write down a paper comprising of 500-1000 words

write a paper consisting of 500-1000 words double-spaced on the security effects of cryptographic tunneling based on an

  Display a message indicating whether the person

If the BMI valu is greater than 25,the person is considered to be overweight. I got the solution for the pseudocode but the flowchart is a little bit confusing.

  It will calculate the additional amount of sales that each

modifynbspthe week three javatm application using javatm netbeanstm ide to meet these additional and changed business

  Given an operating system that supports a one - to -one

given an operating system that supports a one - to -one relationship between user-level threads and kernel - level

  Explain thread need to wait for faulting page in memory

Other user user threads belonging to the same process also be affected by the page fault - that is would they also have to wait for the faulting page to be brought into memory? Explain.

  Design program using switch statements in visual basic

design program using switch statements in Visual Basic.

  Give an example of a nonporous item and what method you

1.give an example of a nonporous item and what method you would use to process it. where might you expect to find

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd