SlideShare a Scribd company logo
1 of 16
HoneyPots  for Network Security Using Honeyd
Botnets ,[object Object],[object Object],botnets.png
Botnets botnets2.jpg ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Botnet  Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],botnets3.jpg
Types of Botnet  Attacks botnets4.jpg ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Honeypots ,[object Object],[object Object],[object Object],[object Object],honeypot.png
Types of Honeypots ,[object Object],[object Object],[object Object],[object Object],honeypot2.jpeg
Honeyd ,[object Object],honeyd.gif
Primary Applications of Honeyd ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Honeyd  Configuration ,[object Object],[object Object],honeyd1.png ,[object Object],[object Object]
Honeyd  Configuration ,[object Object],[object Object],[object Object]
Honeyd  Configuration honeyd1.png ,[object Object],[object Object],[object Object],[object Object],[object Object]
Honeyd  Configuration ,[object Object],[object Object],[object Object],[object Object],honeypot1.jpg
Honeyd  Configuration ,[object Object],[object Object],honeyd2.png
Honeyd  Configuration ,[object Object],[object Object],[object Object],[object Object]
Testing H oneyd ,[object Object],nmap.png

More Related Content

What's hot (20)

Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
State of the Art: IoT Honeypots
State of the Art: IoT HoneypotsState of the Art: IoT Honeypots
State of the Art: IoT Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honey pots
Honey potsHoney pots
Honey pots
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Viewers also liked (20)

Honeypot
HoneypotHoneypot
Honeypot
 
Study of our environment by parveen
Study of our environment by parveenStudy of our environment by parveen
Study of our environment by parveen
 
Interactive presentation screen format 16-9 - minimal for slideshare
Interactive presentation   screen format 16-9 - minimal for slideshareInteractive presentation   screen format 16-9 - minimal for slideshare
Interactive presentation screen format 16-9 - minimal for slideshare
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeynet
HoneynetHoneynet
Honeynet
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
CDE future sonar webinar
CDE future sonar webinar CDE future sonar webinar
CDE future sonar webinar
 
Honeypot Project
Honeypot ProjectHoneypot Project
Honeypot Project
 
Ppt
PptPpt
Ppt
 
GIS for Defence
GIS for DefenceGIS for Defence
GIS for Defence
 
Conferencia Honeynets - CongresoSSI
Conferencia Honeynets - CongresoSSIConferencia Honeynets - CongresoSSI
Conferencia Honeynets - CongresoSSI
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Presentacion ugr honeypots
Presentacion ugr honeypotsPresentacion ugr honeypots
Presentacion ugr honeypots
 
Honeypot cupcakes
Honeypot cupcakesHoneypot cupcakes
Honeypot cupcakes
 
Honeypot Social Profiling
Honeypot Social ProfilingHoneypot Social Profiling
Honeypot Social Profiling
 
Honeypots for Active Defense
Honeypots for Active DefenseHoneypots for Active Defense
Honeypots for Active Defense
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
Análisis forense en una fuga de datos. trampas en la red
Análisis forense en una fuga de datos. trampas en la redAnálisis forense en una fuga de datos. trampas en la red
Análisis forense en una fuga de datos. trampas en la red
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Honeypot
HoneypotHoneypot
Honeypot
 

Similar to Honeypot Presentation - Using Honeyd

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
Internet security
Internet securityInternet security
Internet securitygohel
 
Design & Implementation of Honeyd to Simulate Virtual Honeypots
Design & Implementation of Honeyd to Simulate Virtual  HoneypotsDesign & Implementation of Honeyd to Simulate Virtual  Honeypots
Design & Implementation of Honeyd to Simulate Virtual HoneypotsIOSR Journals
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareNatraj G
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deceptionmilad saber
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachIBM Security
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 

Similar to Honeypot Presentation - Using Honeyd (20)

Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
Internet security
Internet securityInternet security
Internet security
 
Internet security
Internet securityInternet security
Internet security
 
Design & Implementation of Honeyd to Simulate Virtual Honeypots
Design & Implementation of Honeyd to Simulate Virtual  HoneypotsDesign & Implementation of Honeyd to Simulate Virtual  Honeypots
Design & Implementation of Honeyd to Simulate Virtual Honeypots
 
E0312834
E0312834E0312834
E0312834
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
Basic Dynamic Analysis of Malware
Basic Dynamic Analysis of MalwareBasic Dynamic Analysis of Malware
Basic Dynamic Analysis of Malware
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
4
44
4
 

Honeypot Presentation - Using Honeyd

  • 1. HoneyPots for Network Security Using Honeyd
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.