SlideShare a Scribd company logo
1 of 1
Download to read offline
Honeypots
You're responsible for the security of Xen Tech Limited a large IT company in Jamaica. Due to a
recent increase in cyber-attacks against the companys webserver, the management has
suggested that you implement a system to detect and track potential attackers who are trying to
break into the network. You decide to set up a honeypot to lure attackers into revealing their
tactics and techniques.
You desire to configure the honeypot to mimic a vulnerable server that's commonly targeted by
attackers and place it on a separate network segment to prevent attackers from accessing your
production systems. You also desire to set up monitoring and logging tools to capture and analyze
all traffic to and from the honeypot.
Tasks: (Be as creative as you can)
Write a python Honeypot that listens for incoming connections on multiple ports (22, 80, and 443)
and logs any data received.
The honeypot should also include additional features such as packet capture, intrusion detection,
and alerting.
Write a report to share your findings to include source and destination IP addresses captured, any
intrusions detect, possible vulnerabilities attackers were targeting and alerts etc
Suggest ways to properly secure the honeypot to prevent attackers from using it to attack other
systems if the organization is using only layer 2 switches.
Bonus
Simulate how you would create a VLAN in Cisco Packet Tracer to segment the Honeypot from
production systems assuming layer 2 switches are being used.

More Related Content

Similar to Honeypots Youre responsible for the security of Xen Tech Li.pdf

HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisAntonio Parata
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTMsharetech
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deceptionmilad saber
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threatsMartin Holovský
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876Momita Sharma
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 

Similar to Honeypots Youre responsible for the security of Xen Tech Li.pdf (20)

OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
HackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware AnalysisHackInBo2k16 - Threat Intelligence and Malware Analysis
HackInBo2k16 - Threat Intelligence and Malware Analysis
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
ShareTech Next-Gen UTM
ShareTech Next-Gen UTMShareTech Next-Gen UTM
ShareTech Next-Gen UTM
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
M0704071074
M0704071074M0704071074
M0704071074
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
 
1376841709 17879811
1376841709  178798111376841709  17879811
1376841709 17879811
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 

More from shahidipen68

How might taxonomic resolution how precisely we identify or.pdf
How might taxonomic resolution how precisely we identify or.pdfHow might taxonomic resolution how precisely we identify or.pdf
How might taxonomic resolution how precisely we identify or.pdfshahidipen68
 
Home Work 8 Assume the cells below represents the daughter.pdf
Home Work 8 Assume the cells below represents the daughter.pdfHome Work 8 Assume the cells below represents the daughter.pdf
Home Work 8 Assume the cells below represents the daughter.pdfshahidipen68
 
Homework Unanswered Due Mar 21st 1159PM Match the gene.pdf
Homework  Unanswered  Due Mar 21st 1159PM Match the gene.pdfHomework  Unanswered  Due Mar 21st 1159PM Match the gene.pdf
Homework Unanswered Due Mar 21st 1159PM Match the gene.pdfshahidipen68
 
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdf
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdfHLTH339 UNIT 3DB Assignment Details Health care has not only.pdf
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdfshahidipen68
 
Holt Enterprises recently paid a dividend De of 3150 It .pdf
Holt Enterprises recently paid a dividend De of 3150 It .pdfHolt Enterprises recently paid a dividend De of 3150 It .pdf
Holt Enterprises recently paid a dividend De of 3150 It .pdfshahidipen68
 
Hospitality service providers like Hilton serve 3 segments .pdf
Hospitality service providers like Hilton serve 3 segments .pdfHospitality service providers like Hilton serve 3 segments .pdf
Hospitality service providers like Hilton serve 3 segments .pdfshahidipen68
 
Homework 520 points evenly distributed Pumping Lemma 1.pdf
Homework  520 points evenly distributed  Pumping Lemma 1.pdfHomework  520 points evenly distributed  Pumping Lemma 1.pdf
Homework 520 points evenly distributed Pumping Lemma 1.pdfshahidipen68
 
Historia americana 1 Prcticamente todos los padres fundad.pdf
Historia americana  1 Prcticamente todos los padres fundad.pdfHistoria americana  1 Prcticamente todos los padres fundad.pdf
Historia americana 1 Prcticamente todos los padres fundad.pdfshahidipen68
 
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdf
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdfHindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdf
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdfshahidipen68
 
Hook Baif incorpotated processes king salmon for various dis.pdf
Hook Baif incorpotated processes king salmon for various dis.pdfHook Baif incorpotated processes king salmon for various dis.pdf
Hook Baif incorpotated processes king salmon for various dis.pdfshahidipen68
 
homogenous functions Consider the following functions Gx.pdf
homogenous functions   Consider the following functions Gx.pdfhomogenous functions   Consider the following functions Gx.pdf
homogenous functions Consider the following functions Gx.pdfshahidipen68
 
Hillyard Company an office supplies specialty store prepar.pdf
Hillyard Company an office supplies specialty store prepar.pdfHillyard Company an office supplies specialty store prepar.pdf
Hillyard Company an office supplies specialty store prepar.pdfshahidipen68
 
Homework Due on Mar 23 2023 Use Excel to draw a figure.pdf
Homework Due on Mar 23 2023  Use Excel to draw a figure.pdfHomework Due on Mar 23 2023  Use Excel to draw a figure.pdf
Homework Due on Mar 23 2023 Use Excel to draw a figure.pdfshahidipen68
 
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdf
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdfHomework 6 Survey Report due 320 2023Homework 6 Survey R.pdf
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdfshahidipen68
 
Homework Implement the Algorithm in Figure 11 using java Fi.pdf
Homework Implement the Algorithm in Figure 11 using java Fi.pdfHomework Implement the Algorithm in Figure 11 using java Fi.pdf
Homework Implement the Algorithm in Figure 11 using java Fi.pdfshahidipen68
 
Homework Unanswered Due Today 1159 PM Match the follow.pdf
Homework  Unanswered  Due Today 1159 PM Match the follow.pdfHomework  Unanswered  Due Today 1159 PM Match the follow.pdf
Homework Unanswered Due Today 1159 PM Match the follow.pdfshahidipen68
 
Hint Poisson splitting Jobs arrive to a data center with.pdf
Hint Poisson splitting Jobs arrive to a data center with.pdfHint Poisson splitting Jobs arrive to a data center with.pdf
Hint Poisson splitting Jobs arrive to a data center with.pdfshahidipen68
 
HIV as yapmak zordur nk ____ maliyet engelleyici vir.pdf
HIV as yapmak zordur nk ____   maliyet engelleyici  vir.pdfHIV as yapmak zordur nk ____   maliyet engelleyici  vir.pdf
HIV as yapmak zordur nk ____ maliyet engelleyici vir.pdfshahidipen68
 
How to fix these erros The method sortListltTgt in the.pdf
How to fix these erros The method sortListltTgt in the.pdfHow to fix these erros The method sortListltTgt in the.pdf
How to fix these erros The method sortListltTgt in the.pdfshahidipen68
 
How to do Wth Explanation pls Thank you Define a function.pdf
How to do Wth Explanation pls Thank you Define a function.pdfHow to do Wth Explanation pls Thank you Define a function.pdf
How to do Wth Explanation pls Thank you Define a function.pdfshahidipen68
 

More from shahidipen68 (20)

How might taxonomic resolution how precisely we identify or.pdf
How might taxonomic resolution how precisely we identify or.pdfHow might taxonomic resolution how precisely we identify or.pdf
How might taxonomic resolution how precisely we identify or.pdf
 
Home Work 8 Assume the cells below represents the daughter.pdf
Home Work 8 Assume the cells below represents the daughter.pdfHome Work 8 Assume the cells below represents the daughter.pdf
Home Work 8 Assume the cells below represents the daughter.pdf
 
Homework Unanswered Due Mar 21st 1159PM Match the gene.pdf
Homework  Unanswered  Due Mar 21st 1159PM Match the gene.pdfHomework  Unanswered  Due Mar 21st 1159PM Match the gene.pdf
Homework Unanswered Due Mar 21st 1159PM Match the gene.pdf
 
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdf
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdfHLTH339 UNIT 3DB Assignment Details Health care has not only.pdf
HLTH339 UNIT 3DB Assignment Details Health care has not only.pdf
 
Holt Enterprises recently paid a dividend De of 3150 It .pdf
Holt Enterprises recently paid a dividend De of 3150 It .pdfHolt Enterprises recently paid a dividend De of 3150 It .pdf
Holt Enterprises recently paid a dividend De of 3150 It .pdf
 
Hospitality service providers like Hilton serve 3 segments .pdf
Hospitality service providers like Hilton serve 3 segments .pdfHospitality service providers like Hilton serve 3 segments .pdf
Hospitality service providers like Hilton serve 3 segments .pdf
 
Homework 520 points evenly distributed Pumping Lemma 1.pdf
Homework  520 points evenly distributed  Pumping Lemma 1.pdfHomework  520 points evenly distributed  Pumping Lemma 1.pdf
Homework 520 points evenly distributed Pumping Lemma 1.pdf
 
Historia americana 1 Prcticamente todos los padres fundad.pdf
Historia americana  1 Prcticamente todos los padres fundad.pdfHistoria americana  1 Prcticamente todos los padres fundad.pdf
Historia americana 1 Prcticamente todos los padres fundad.pdf
 
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdf
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdfHindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdf
Hindistandan Karayiplere gelen szlemeli hizmetiler yeni .pdf
 
Hook Baif incorpotated processes king salmon for various dis.pdf
Hook Baif incorpotated processes king salmon for various dis.pdfHook Baif incorpotated processes king salmon for various dis.pdf
Hook Baif incorpotated processes king salmon for various dis.pdf
 
homogenous functions Consider the following functions Gx.pdf
homogenous functions   Consider the following functions Gx.pdfhomogenous functions   Consider the following functions Gx.pdf
homogenous functions Consider the following functions Gx.pdf
 
Hillyard Company an office supplies specialty store prepar.pdf
Hillyard Company an office supplies specialty store prepar.pdfHillyard Company an office supplies specialty store prepar.pdf
Hillyard Company an office supplies specialty store prepar.pdf
 
Homework Due on Mar 23 2023 Use Excel to draw a figure.pdf
Homework Due on Mar 23 2023  Use Excel to draw a figure.pdfHomework Due on Mar 23 2023  Use Excel to draw a figure.pdf
Homework Due on Mar 23 2023 Use Excel to draw a figure.pdf
 
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdf
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdfHomework 6 Survey Report due 320 2023Homework 6 Survey R.pdf
Homework 6 Survey Report due 320 2023Homework 6 Survey R.pdf
 
Homework Implement the Algorithm in Figure 11 using java Fi.pdf
Homework Implement the Algorithm in Figure 11 using java Fi.pdfHomework Implement the Algorithm in Figure 11 using java Fi.pdf
Homework Implement the Algorithm in Figure 11 using java Fi.pdf
 
Homework Unanswered Due Today 1159 PM Match the follow.pdf
Homework  Unanswered  Due Today 1159 PM Match the follow.pdfHomework  Unanswered  Due Today 1159 PM Match the follow.pdf
Homework Unanswered Due Today 1159 PM Match the follow.pdf
 
Hint Poisson splitting Jobs arrive to a data center with.pdf
Hint Poisson splitting Jobs arrive to a data center with.pdfHint Poisson splitting Jobs arrive to a data center with.pdf
Hint Poisson splitting Jobs arrive to a data center with.pdf
 
HIV as yapmak zordur nk ____ maliyet engelleyici vir.pdf
HIV as yapmak zordur nk ____   maliyet engelleyici  vir.pdfHIV as yapmak zordur nk ____   maliyet engelleyici  vir.pdf
HIV as yapmak zordur nk ____ maliyet engelleyici vir.pdf
 
How to fix these erros The method sortListltTgt in the.pdf
How to fix these erros The method sortListltTgt in the.pdfHow to fix these erros The method sortListltTgt in the.pdf
How to fix these erros The method sortListltTgt in the.pdf
 
How to do Wth Explanation pls Thank you Define a function.pdf
How to do Wth Explanation pls Thank you Define a function.pdfHow to do Wth Explanation pls Thank you Define a function.pdf
How to do Wth Explanation pls Thank you Define a function.pdf
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Honeypots Youre responsible for the security of Xen Tech Li.pdf

  • 1. Honeypots You're responsible for the security of Xen Tech Limited a large IT company in Jamaica. Due to a recent increase in cyber-attacks against the companys webserver, the management has suggested that you implement a system to detect and track potential attackers who are trying to break into the network. You decide to set up a honeypot to lure attackers into revealing their tactics and techniques. You desire to configure the honeypot to mimic a vulnerable server that's commonly targeted by attackers and place it on a separate network segment to prevent attackers from accessing your production systems. You also desire to set up monitoring and logging tools to capture and analyze all traffic to and from the honeypot. Tasks: (Be as creative as you can) Write a python Honeypot that listens for incoming connections on multiple ports (22, 80, and 443) and logs any data received. The honeypot should also include additional features such as packet capture, intrusion detection, and alerting. Write a report to share your findings to include source and destination IP addresses captured, any intrusions detect, possible vulnerabilities attackers were targeting and alerts etc Suggest ways to properly secure the honeypot to prevent attackers from using it to attack other systems if the organization is using only layer 2 switches. Bonus Simulate how you would create a VLAN in Cisco Packet Tracer to segment the Honeypot from production systems assuming layer 2 switches are being used.