PORTFOLIO PROJECT / HoneyBOT

 Description Hands-On Project – HoneyBOT® HoneyBOT® is a simple honeypot for beginners to use. Honeypots can give you a good idea of how many people are probing your machine for weaknesses. Without a honeypot, you may not be able to tell if anyone is scanning your machine. In this example, you will use your Web browser to generate some entries in HoneyBOT. You will try to make FTP and HTTP connections with your own computer. The honeypot will record the IP address of the remote machine that is scanning your computer and each port that was scanned. Download HoneyBOT from http://www.atomicsoftwaresolutions.com/honeybot.php (Links to an external site.) Links to an external site. . Click on the Download link in the left-hand menu. Click on the appropriate “here” link to download the latest version of HoneyBOT. Click Save. Select your downloads folder. Browse to your downloads folder. Double-Click HoneyBOT_018.exe. (The version number may be different as newer releases become available.) Click Run, Next, I Accept, Next, Next, and Next. Check Create desktop icon. Click Next, Install, and Finish. Press the Start button or click File, and Start. HoneyBOT may ask you to select an adapter if you have multiple NICs in your computer; select your current IP address. (It could be a non-routable IP that starts with “192.168” or it could be a typical IP address.) Click OK. Take a screenshot showing the total number of sockets loaded in the bottom status bar. Click Start. Open a Web browser and go to FTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT. In this example, it was ftp://155.97.74.45.) When prompted for a username, enter your first name. Enter your last name for the password. (Entering your first and last name as username and password will record them in the HoneyBOT log. You don’t really have an FTP server running. It’s being “faked” by HoneyBOT.) Open a Web browser and go to HTTP://[Your IP Address]. (Replace Your IP Address with the IP address that is being used by HoneyBOT.) Return to HoneyBOT and take a screenshot. Double-click on one of the entries with the local port listing 21. (The remote IP and local IP should be the same.) Take a screenshot of the HoneyBOT log entry showing your first and last name being used to access an FTP server. Submit your Screenshots and answer the following questions: What impact would more open ports have on the ability of your honeypot to attract hackers? Can hackers tell that you have a honeypot running? Do they have honeypots for spammers to keep them from harvesting emails from your webpages? Do you think law enforcement agencies (e.g., CIA, FBI, NSA, etc.) in the United States run honeypots to track criminal behavior? Directions: The content of the paper must be eight to ten pages in length and formatted according to the CSU-Global Guide to Writing and APA Requirements (Links to an external site.) Links to an external site. . A minimum of six references (in addition to course materials, like the textbook or articles). At least two of these being peer-reviewed articles. The CSU-Global Library is a good place to search for credible, scholarly sources.

#PORTFOLIO #PROJECT #HoneyBOT

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Identify, analyze, and evaluate quantitative and qualitative healthcare data and information for effective decision making in various healthcare

Identify, analyze, and evaluate quantitative and qualitative healthcare data and information for effective decision making in various healthcare settings  Explain data to a healthcare audience in a clear, concise, and persuasive manner, consistent with best practices in the field of healthcare management to inform or advocate change. Assess the ethical

JWI 530: Financial Management I Assignment 1B© Strayer University. All Rights Reserved. This document contains Strayer University confidential an

JWI 530: Financial Management I Assignment 1B © Strayer University. All Rights Reserved. This document contains Strayer University confidential and proprietary information and may not be copied, further distributed, or otherwise disclosed, in whole or in part, without the expressed written permission of Strayer University. This document is subject to

For this assignment, your describe the chapter’s main points with relevant comments, notes, and questions. Investigate computational methods that are

For this assignment, your describe the chapter’s main points with relevant comments, notes, and questions. Investigate computational methods that are helpful in understanding, implementing, or extending the topics addressed. Consider, for example, demonstrating key computational elements by applying an R or Python package or by writing R or Python scripts.