A honeypot
is a device, placed on computer network. It capture the malicious traffic on
network. Honeypot are one of the leading security tools used to monitor. The captured information is highly valuable as it contains only malicious traffic with little to no false positives.
Installing HoneyBOT:
HoneyBOT is compatible with and has been tested to work on Windows
2000 and Windows XP computers. At least 128MB of ram is
recommended.
1. HoneyBOT can be downloaded from web site at:
http://www.atomicsoftwaresolutions.com/honeybot.php
2. After clicking the download link save HoneyBOT_010.exe to a location
on your hard drive.
3. Double click the HoneyBOT_010.exe installation file to begin the setup
process.
4. Follow the prompts in the setup process. The default installation folder
for setup is c:\honeybot\
5. Setup will create a shortcut in the Start Menu folder and an option is
available to create a desktop icon.
6. Now you can launch HoneyBOT using the programs shortcut icon.
Working:
Honeypot create a virtual network and safe the original network from the unauthentic attacks. And it set a trap to detect the attacker and unauthorized use of information system. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Test server has captured several thousand trojans and rootkits from these simulated services.
Honeypot create a virtual network and safe the original network from the unauthentic attacks. And it set a trap to detect the attacker and unauthorized use of information system. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Test server has captured several thousand trojans and rootkits from these simulated services.
Types of Honeypot:
1.Production Honeypot-
- Production Honeypot Easy to use.
- Capture limited information.
- Used by primarily by companies and comporting.
- It placed inside the production network.
- Production honeypot is low interaction honeypot.
- It is easier to deploy.
- They gave less information about the attacks and attackers.
2.Research Honeypot-
- It runs by non-profit research organization or an educational institution to gather information.
- Black hat community targets different network. They are used to research the threats organization face.
- Learn better protect against those threats.
- It is complex to deploy and maintain. Capture extension information, and are used primarily by research, military, or government organizations.
Installing HoneyBOT:
HoneyBOT is compatible with and has been tested to work on Windows
2000 and Windows XP computers. At least 128MB of ram is
recommended.
1. HoneyBOT can be downloaded from web site at:
http://www.atomicsoftwaresolutions.com/honeybot.php
2. After clicking the download link save HoneyBOT_010.exe to a location
on your hard drive.
3. Double click the HoneyBOT_010.exe installation file to begin the setup
process.
4. Follow the prompts in the setup process. The default installation folder
for setup is c:\honeybot\
5. Setup will create a shortcut in the Start Menu folder and an option is
available to create a desktop icon.
6. Now you can launch HoneyBOT using the programs shortcut icon.
No comments:
Post a Comment