SlideShare a Scribd company logo
HoneyPots  for Network Security Using Honeyd
Botnets One of the biggest threats in network security is botnets . Botnets   are a collection of infected computers or bots that have been taken over by   Hackers   (sometimes known as  bot  herders) and are used to perform malicious tasks or functions.  botnets.png
Botnets botnets2.jpg This example illustrates how a botnet  is created and used to send email spam . A botnet  operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application—the  bot . The  bot  on the infected PC logs into a particular C&C server (often an IRC server, but, in some cases a web server). A spammer purchases the services of the botnet  from the operator. The spammer provides the spam messages to the operator, who instructs the compromised machines via the IRC server, causing them to send out spam messages.
Types of Botnet  Attacks Spyware software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market Adware advertise some commercial entity actively and without the user's permission or awareness Denial of Service multiple systems autonomously access a single Internet system or service in a way that appears legitimate, but much more frequently than normal use and cause the system to become busy botnets3.jpg
Types of Botnet  Attacks botnets4.jpg Fast Flux DNS technique used by botnets  to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies Click Fraud user's computer visiting websites without the user's awareness to create false web traffic for the purpose of personal or commercial gain E-mail spam e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious in nature
Honeypots A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server doing work, but all the  data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine vulnerabilities in the real system . Set to detect , deflect, or in some manner counteract attempts at unauthorized use of information systems. honeypot.png
Types of Honeypots Generally speaking there are two different types of Honeypots : Production Honeypots  and Research Honeypots Production Honeypots  are used primarily by companies or corporations to improve  their overall state of security. Research Honeypots  are used primarily by non-profit research organizations or educational institutions to research the threats organizations face and learn how to better protect against those threats. Research Honeypots  are used primarily by non-profit research organizations or educational institutions to research the threats organizations face and learn how to better protect against those threats. honeypot2.jpeg
Honeyd Honeyd  is a type of daemon honeypot licensed by GPL that has the ability to simulate a big network while using only a single host. To outsiders, the Honeyd  looks like a computer network on a network's unused address space. honeyd.gif
Primary Applications of Honeyd Distraction Using the software's ability to mimic many different network hosts at once, Honeyd can act as a distraction to potential hackers. If a network only has 3 real servers, but one server is running Honeyd , the network will appear running hundreds of servers to a hacker.  The hacker will then have to do more research in order to determine which servers are real, or the hacker may get caught in a honeypot. Either way, the hacker will be slowed down or possibly caught. Honeypot On a network, all normal traffic should be to and from valid servers only. Thus , a network administrator running Honeyd  can monitor his/her logs to see if there is any traffic going to the virtual hosts set up by Honeyd . Any traffic going to these virtual servers can be considered highly suspicious. The network administrator can then take preventative action, perhaps by blocking the suspicious IP address or by further monitoring the network for suspicious traffic.
Honeyd  Configuration /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf honeyd1.png /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf
Honeyd  Configuration /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf Honeyd.conf  is the main configuration file for setting the “personalities” of the virtual hosts.
Honeyd  Configuration honeyd1.png Honeyd.conf Creates the default actions for the machines  creates a personality template called honeypot-template Sets the mac  address, OS, uptime, available protocols and open ports Binds the templates to 2 unused IP addresses on the network
Honeyd  Configuration $ iptables  -A INPUT -d 192.168.1.201 -j ACCEPT  $ iptables -A INPUT -d 192.168.1.202 -j ACCEPT  $ iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT Modifies the rules of your firewall to accept packets for the IP Addresses defined in the honeyd's  configuration file honeypot1.jpg
Honeyd  Configuration /etc/default/ honeyd Sets the default run behavior of honeyd honeyd2.png
Honeyd  Configuration Another daemon that runs alongside of honeyd  is farpd  which is the daemon that is forwarding the traffic from the virtual hosts to the main honeyd  server. farpd  replies to any ARP request for an IP address matching the specified destination  net  with the hardware MAC address of the specified  interface , but only after determining if another host already claims it. Any IP address claimed by  farpd  is eventually forgotten after a period of inactivity or after a hard timeout, and is relinquished if the real owner shows up. This enables a single host to claim all unassigned addresses on a LAN for network monitoring or simulation.
Testing H oneyd The network scanner To test if the virtual hosts are responding with the right information nmap.png

More Related Content

PDF
Virtual honeypot
PPTX
Hybrid honeypots for network security
PPTX
Deception technology for advanced detection
PPTX
Honeypots and honeynets
PPTX
Honeypot ppt1
PDF
Honeypot 101 (slide share)
PDF
Cybersecurity for everyone - Course Final Project.pdf
PPTX
Virtual honeypot
Hybrid honeypots for network security
Deception technology for advanced detection
Honeypots and honeynets
Honeypot ppt1
Honeypot 101 (slide share)
Cybersecurity for everyone - Course Final Project.pdf

What's hot (20)

PPTX
HONEYPOTS: Definition, working, advantages, disadvantages
PPT
PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PPT
Honeypot honeynet
PPTX
Tushar mandal.honeypot
PDF
Honeypots for Network Security
PDF
Deception Technology: Use Cases & Implementation Approaches
PDF
SACON - Deception Technology (Sahir Hidayatullah)
PPTX
Cyber Deception - AttivoNetwork
PPT
All about Honeypots & Honeynets
PPTX
Subnetting (FLSM & VLSM) with examples
PPTX
Honeypots
PDF
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
PPT
Adhoc and Sensor Networks - Chapter 05
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPSX
Honeypot and deception
PPTX
Honeypots (Ravindra Singh Rathore)
PPTX
Honeypot
PPTX
Cyber security with ai
PPTX
Homomorphic Encryption
HONEYPOTS: Definition, working, advantages, disadvantages
Threat-Based Adversary Emulation with MITRE ATT&CK
Honeypot honeynet
Tushar mandal.honeypot
Honeypots for Network Security
Deception Technology: Use Cases & Implementation Approaches
SACON - Deception Technology (Sahir Hidayatullah)
Cyber Deception - AttivoNetwork
All about Honeypots & Honeynets
Subnetting (FLSM & VLSM) with examples
Honeypots
Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021
Adhoc and Sensor Networks - Chapter 05
Computer Security and Intrusion Detection(IDS/IPS)
Honeypot and deception
Honeypots (Ravindra Singh Rathore)
Honeypot
Cyber security with ai
Homomorphic Encryption
Ad

Viewers also liked (20)

PPTX
Honeypot
PPT
Honeypots
PPTX
Study of our environment by parveen
PPTX
Interactive presentation screen format 16-9 - minimal for slideshare
PDF
Honeypots
PPT
Lecture 7
PDF
CDE future sonar webinar
PPT
Honeypot Project
PPTX
GIS for Defence
PPTX
Conferencia Honeynets - CongresoSSI
PPTX
Honey po tppt
PDF
Presentacion ugr honeypots
PPTX
Honeypot cupcakes
PDF
Honeypot Social Profiling
PDF
Honeypots for Active Defense
PPT
Honeypots - Tracking the Blackhat Community
PPT
Honeypot Basics
PPTX
Honeypot ss
Honeypot
Honeypots
Study of our environment by parveen
Interactive presentation screen format 16-9 - minimal for slideshare
Honeypots
Lecture 7
CDE future sonar webinar
Honeypot Project
GIS for Defence
Conferencia Honeynets - CongresoSSI
Honey po tppt
Presentacion ugr honeypots
Honeypot cupcakes
Honeypot Social Profiling
Honeypots for Active Defense
Honeypots - Tracking the Blackhat Community
Honeypot Basics
Honeypot ss
Ad

Similar to Honeypot Presentation - Using Honeyd (20)

PPT
honeypots.ppt
PPTX
Honeypots.ppt1800363876
PDF
A virtual honeypot framework
PPTX
Honeypots
PPTX
Honeypots
DOCX
Honeypots
PPTX
Honey pot in cloud computing
PDF
honeypots-140921060716-phpapp01 (1).pdf
PPT
Honeypot
PPT
Honeypot
PPT
Defending Your Network
PDF
Design & Implementation of Honeyd to Simulate Virtual Honeypots
PPTX
honeypots-140921060716-phpapp01 (1).pptx
PPT
Honey Pot
PPTX
honeypotss.pptx
PPTX
Honeypot a trap to hackers
PPTX
Honeypots for Cloud Providers - SDN World Congress
PPT
Using Canary Honeypots for Network Security Monitoring
honeypots.ppt
Honeypots.ppt1800363876
A virtual honeypot framework
Honeypots
Honeypots
Honeypots
Honey pot in cloud computing
honeypots-140921060716-phpapp01 (1).pdf
Honeypot
Honeypot
Defending Your Network
Design & Implementation of Honeyd to Simulate Virtual Honeypots
honeypots-140921060716-phpapp01 (1).pptx
Honey Pot
honeypotss.pptx
Honeypot a trap to hackers
Honeypots for Cloud Providers - SDN World Congress
Using Canary Honeypots for Network Security Monitoring

Honeypot Presentation - Using Honeyd

  • 1. HoneyPots for Network Security Using Honeyd
  • 2. Botnets One of the biggest threats in network security is botnets . Botnets   are a collection of infected computers or bots that have been taken over by   Hackers   (sometimes known as  bot herders) and are used to perform malicious tasks or functions.  botnets.png
  • 3. Botnets botnets2.jpg This example illustrates how a botnet is created and used to send email spam . A botnet operator sends out viruses or worms, infecting ordinary users' computers, whose payload is a malicious application—the  bot . The  bot  on the infected PC logs into a particular C&C server (often an IRC server, but, in some cases a web server). A spammer purchases the services of the botnet from the operator. The spammer provides the spam messages to the operator, who instructs the compromised machines via the IRC server, causing them to send out spam messages.
  • 4. Types of Botnet Attacks Spyware software which sends information to its creators about a user's activities – typically passwords, credit card numbers and other information that can be sold on the black market Adware advertise some commercial entity actively and without the user's permission or awareness Denial of Service multiple systems autonomously access a single Internet system or service in a way that appears legitimate, but much more frequently than normal use and cause the system to become busy botnets3.jpg
  • 5. Types of Botnet Attacks botnets4.jpg Fast Flux DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies Click Fraud user's computer visiting websites without the user's awareness to create false web traffic for the purpose of personal or commercial gain E-mail spam e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious in nature
  • 6. Honeypots A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server doing work, but all the  data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine vulnerabilities in the real system . Set to detect , deflect, or in some manner counteract attempts at unauthorized use of information systems. honeypot.png
  • 7. Types of Honeypots Generally speaking there are two different types of Honeypots : Production Honeypots and Research Honeypots Production Honeypots are used primarily by companies or corporations to improve their overall state of security. Research Honeypots are used primarily by non-profit research organizations or educational institutions to research the threats organizations face and learn how to better protect against those threats. Research Honeypots are used primarily by non-profit research organizations or educational institutions to research the threats organizations face and learn how to better protect against those threats. honeypot2.jpeg
  • 8. Honeyd Honeyd is a type of daemon honeypot licensed by GPL that has the ability to simulate a big network while using only a single host. To outsiders, the Honeyd looks like a computer network on a network's unused address space. honeyd.gif
  • 9. Primary Applications of Honeyd Distraction Using the software's ability to mimic many different network hosts at once, Honeyd can act as a distraction to potential hackers. If a network only has 3 real servers, but one server is running Honeyd , the network will appear running hundreds of servers to a hacker. The hacker will then have to do more research in order to determine which servers are real, or the hacker may get caught in a honeypot. Either way, the hacker will be slowed down or possibly caught. Honeypot On a network, all normal traffic should be to and from valid servers only. Thus , a network administrator running Honeyd can monitor his/her logs to see if there is any traffic going to the virtual hosts set up by Honeyd . Any traffic going to these virtual servers can be considered highly suspicious. The network administrator can then take preventative action, perhaps by blocking the suspicious IP address or by further monitoring the network for suspicious traffic.
  • 10. Honeyd Configuration /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf honeyd1.png /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf
  • 11. Honeyd Configuration /etc/honeypot/ Contains honeyd.conf , nmap.assoc , nmap.prints , pf.os , and xprobe2.conf Honeyd.conf is the main configuration file for setting the “personalities” of the virtual hosts.
  • 12. Honeyd Configuration honeyd1.png Honeyd.conf Creates the default actions for the machines creates a personality template called honeypot-template Sets the mac address, OS, uptime, available protocols and open ports Binds the templates to 2 unused IP addresses on the network
  • 13. Honeyd Configuration $ iptables -A INPUT -d 192.168.1.201 -j ACCEPT  $ iptables -A INPUT -d 192.168.1.202 -j ACCEPT  $ iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT Modifies the rules of your firewall to accept packets for the IP Addresses defined in the honeyd's configuration file honeypot1.jpg
  • 14. Honeyd Configuration /etc/default/ honeyd Sets the default run behavior of honeyd honeyd2.png
  • 15. Honeyd Configuration Another daemon that runs alongside of honeyd is farpd which is the daemon that is forwarding the traffic from the virtual hosts to the main honeyd server. farpd  replies to any ARP request for an IP address matching the specified destination  net  with the hardware MAC address of the specified  interface , but only after determining if another host already claims it. Any IP address claimed by  farpd  is eventually forgotten after a period of inactivity or after a hard timeout, and is relinquished if the real owner shows up. This enables a single host to claim all unassigned addresses on a LAN for network monitoring or simulation.
  • 16. Testing H oneyd The network scanner To test if the virtual hosts are responding with the right information nmap.png