SlideShare a Scribd company logo
EmilTan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
Research Guide
http://honeynet.sg
Introduction to Honeypots
The Honeynet Project.
The Honeynet Project is a leading international 501c3 non-profit
security research organisation, dedicated to investigating the latest
attacks and developing open source security tools to improve
Internet security.
Founded in 1999,The Honeynet Project has contributed to fight
against malware and malicious hacking attacks and has the leading
security professional among members and alumni.
 Website: http://www.honeynet.org/ http://www.honeynet.sg
Agenda.
 What is honeypot.
 What types of honeypot are there.
 Introduction to honeypot tools.
 How to deploy them.
 Deployment considerations.
 Operational considerations.
 Governance considerations.
 Legal considerations.
What is honeypot.
 Information system resources which has no production
values.
 It values lies in unauthorised or illicit use of that resource.
 It values lies in being probed, attacked, or compromised.
-- Spitzner
 Intelligence gathering
 Analyse trends / behaviours; Know your enemy.
 Decoy / Bait
Types of honeypot.
 High interaction:
 An actual machine.
 Rich content; Fully emulated shells; Fully replicated services.
 Low interaction:
 A program.
 Emulate specific services; limited interactivities.
 Honeytoken
 Hybrid
Honeypot tools.
 High interaction:
 De facto security tools (NIDS, HIDS, etc)
 In-depth Data Capture tools (Sebek, Qebek, Capture-HPC).
 EgressTraffic Control (Snort Inline, iptables)
 Perimeter – Honeywall (Roo)
 WebApplication – Glastopf
 SSL Proxy &Traffic Analyser – HoneyProxy
 USB Malware – Ghost USB
 Low interactions:
 De facto low interaction – Honeyd
 Common ports –Tiny Honeypot
 Malware – Dionaea (… Honeytrap?)
 WebApplication – Glastopf
 USB Malware – Ghost USB
 SSH – Kippo, Kojoney
 Blacklisting – Honeyports
Kojoney.
 Low interaction SSH honeypot.
 Emulate SSH service.
Kojoney Logs.
Kojoney Reports.
Tiny Honeypot.
 Written by George Bakos
 Alpinista.org
 Low interaction honeypot.
 Based on iptables and xinetd listener.
 Emulate well-known services:
 HTTP
 FTP
Honeytrap.
 Written byTillmannWerner.
 Low interaction Malware collection honeypot.
 Dynamic reaction to incoming traffics:
 Pcap-based sniffer
 IP_Queue interface
Deployment & Considerations.
 More Considerations
 Roles and Responsibilities
Deployment Considerations
High or low interaction What do you want from your honeypots?
Honeypot tools What do you want from your honeypots?
Placed in internal or external networks What do you want from your honeypots?
Configuration of your honeypots.
Physical or virtual environment Costs & Maintenance
Dynamics / Programmability Nature of the dynamics
Level of vulnerability What do you want from your honeypots?
Legal considerations

More Related Content

PDF
Honeypot 101 (slide share)
PPTX
Honeypot ppt1
PPTX
Tushar mandal.honeypot
PPTX
Honey pot day 1
PDF
Seminar Report on Honeypot
PPTX
IDS+Honeypots Making Security Simple
PPTX
Honey po tppt
PPTX
Honey pot in cloud computing
Honeypot 101 (slide share)
Honeypot ppt1
Tushar mandal.honeypot
Honey pot day 1
Seminar Report on Honeypot
IDS+Honeypots Making Security Simple
Honey po tppt
Honey pot in cloud computing

What's hot (20)

PPT
Honeypot
PPT
PPTX
Honeypots and honeynets
PPTX
PDF
Honeypots for Network Security
PPT
Honeypot Basics
PPT
Honeypot-A Brief Overview
PPTX
Honeypots (Ravindra Singh Rathore)
PDF
Virtual honeypot
PPTX
Honey pots
PPTX
Honeypot a trap to hackers
PPTX
Honeypots
PPTX
Hybrid honeypots for network security
PPT
Honeypot honeynet
PPTX
Honeypot
PPTX
honey pots introduction and its types
PPTX
Honeypot ss
PPTX
Honeypots.ppt1800363876
PDF
Honeypots
Honeypot
Honeypots and honeynets
Honeypots for Network Security
Honeypot Basics
Honeypot-A Brief Overview
Honeypots (Ravindra Singh Rathore)
Virtual honeypot
Honey pots
Honeypot a trap to hackers
Honeypots
Hybrid honeypots for network security
Honeypot honeynet
Honeypot
honey pots introduction and its types
Honeypot ss
Honeypots.ppt1800363876
Honeypots
Ad

Viewers also liked (6)

PDF
Securing Mobile & Online Identity in the Cyber World
PDF
Introduction to Memory Analysis
PDF
Stalking in the Cyberspace
PDF
A Multidisciplinary Perspective on Cybersecurity
PPT
All about Honeypots & Honeynets
PPT
A Guide to Human Geography
Securing Mobile & Online Identity in the Cyber World
Introduction to Memory Analysis
Stalking in the Cyberspace
A Multidisciplinary Perspective on Cybersecurity
All about Honeypots & Honeynets
A Guide to Human Geography
Ad

Similar to Introduction to Honeypots (20)

PPSX
Honeypot and deception
PDF
Honeypots, Deception, and Frankenstein
PDF
Honeypots, Deception, and Frankenstein
PDF
Deception in Cyber Security (League of Women in Cyber Security)
PPTX
Honeypots
DOCX
Honeypots
PDF
honeypots-140921060716-phpapp01 (1).pdf
PDF
Honeypot- An Overview
PPTX
honeypotss.pptx
PPTX
honeypots-140921060716-phpapp01 (1).pptx
PPTX
honeypots-1409210990716-phpapp01 (2).pptx
PPTX
Honey pots
PPT
Honeypot Project
DOC
Honeypot seminar report
PPTX
Honeypot2
PPTX
Honeypots
DOC
Honeypot Essentials
PPT
Lecture 7
PDF
Honeypot: A Security Tool in Intrusion Detection
Honeypot and deception
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
Deception in Cyber Security (League of Women in Cyber Security)
Honeypots
Honeypots
honeypots-140921060716-phpapp01 (1).pdf
Honeypot- An Overview
honeypotss.pptx
honeypots-140921060716-phpapp01 (1).pptx
honeypots-1409210990716-phpapp01 (2).pptx
Honey pots
Honeypot Project
Honeypot seminar report
Honeypot2
Honeypots
Honeypot Essentials
Lecture 7
Honeypot: A Security Tool in Intrusion Detection

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf

Introduction to Honeypots

  • 1. EmilTan Team Lead, Co-Founder http://edgis-security.org @EdgisSecurity Research Guide http://honeynet.sg Introduction to Honeypots
  • 2. The Honeynet Project. The Honeynet Project is a leading international 501c3 non-profit security research organisation, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security. Founded in 1999,The Honeynet Project has contributed to fight against malware and malicious hacking attacks and has the leading security professional among members and alumni.  Website: http://www.honeynet.org/ http://www.honeynet.sg
  • 3. Agenda.  What is honeypot.  What types of honeypot are there.  Introduction to honeypot tools.  How to deploy them.  Deployment considerations.  Operational considerations.  Governance considerations.  Legal considerations.
  • 4. What is honeypot.  Information system resources which has no production values.  It values lies in unauthorised or illicit use of that resource.  It values lies in being probed, attacked, or compromised. -- Spitzner  Intelligence gathering  Analyse trends / behaviours; Know your enemy.  Decoy / Bait
  • 5. Types of honeypot.  High interaction:  An actual machine.  Rich content; Fully emulated shells; Fully replicated services.  Low interaction:  A program.  Emulate specific services; limited interactivities.  Honeytoken  Hybrid
  • 6. Honeypot tools.  High interaction:  De facto security tools (NIDS, HIDS, etc)  In-depth Data Capture tools (Sebek, Qebek, Capture-HPC).  EgressTraffic Control (Snort Inline, iptables)  Perimeter – Honeywall (Roo)  WebApplication – Glastopf  SSL Proxy &Traffic Analyser – HoneyProxy  USB Malware – Ghost USB  Low interactions:  De facto low interaction – Honeyd  Common ports –Tiny Honeypot  Malware – Dionaea (… Honeytrap?)  WebApplication – Glastopf  USB Malware – Ghost USB  SSH – Kippo, Kojoney  Blacklisting – Honeyports
  • 7. Kojoney.  Low interaction SSH honeypot.  Emulate SSH service.
  • 10. Tiny Honeypot.  Written by George Bakos  Alpinista.org  Low interaction honeypot.  Based on iptables and xinetd listener.  Emulate well-known services:  HTTP  FTP
  • 11. Honeytrap.  Written byTillmannWerner.  Low interaction Malware collection honeypot.  Dynamic reaction to incoming traffics:  Pcap-based sniffer  IP_Queue interface
  • 12. Deployment & Considerations.  More Considerations  Roles and Responsibilities Deployment Considerations High or low interaction What do you want from your honeypots? Honeypot tools What do you want from your honeypots? Placed in internal or external networks What do you want from your honeypots? Configuration of your honeypots. Physical or virtual environment Costs & Maintenance Dynamics / Programmability Nature of the dynamics Level of vulnerability What do you want from your honeypots? Legal considerations