SlideShare a Scribd company logo
HONEYPOT
A T R A P F O R H A C K E R S
BY B H A S K A R A S A I C H I T T U R I
CONTENTS
• Introduction
• History
• What is Honeypot
• Why you should
• How it works
• Classification
• Some famous Honeypots
• Conclusion
INTRO
• Today internet is growing very fast and the number of websites is
doubled for every 53 days and the users of internet also growing. At the
same time cyber crimes also growing very fast.
• As in the army, it is very essential to know, who the enemy is, and what
kind of tactics he uses, what he is aiming for to gather as much
information as possible is the main goal of Honeypot.
• Honeypot is an exciting new technology with enormous potential for the
security community.
HISTORY
• The idea of honeypot began in 1991 with two publications “The
Cuckoos Egg” and “ An evening with beford ”.
• The First Honeypot was released in 1997 called the “Deceptive Tool Kit”
the point of this kit was to use deception to attack back.
• In 1998 the first commercial Honeypot came out This was called as
“Cyber Cop Sting”.
• In 2017, Dutch police successfully used this Honeypot techniques to
track the users of the Darknet Market Hansa.
WHAT IS HONEYPOT?
According to Lance Spitzner, A honeypot is a resource whose
value is being in attacked or compromised. This means, that a Honeypot
is expected to get probed, attacked and potentially exploited. Honeypots
do not fix anything they provide us with additional, valuable information.
Honeypots are a highly flexible security tool with different
applications for security. They don't fix a single problem. Instead they
have multiple uses, such as prevention, detection, or information
gathering.
WHY YOU SHOULD USE?
• Firstly, to divert the attention of attacker from the real network, in a way
that the main information resources are not compromised
• Secondly, to build attacker profiles in order to identify their preferred
attacking methods, like criminal profile.
• Thirdly, to identify new vulnerabilities and risks of various operating
systems, environments and programs which are not thoroughly
identified at the moment.
HOW IT WORKS
• Honeypots are, in their most basic form, fake information severs
strategically-positioned in a test network, which are fed with false
information made unrecognizable as files of classified nature
• To break into Honeypot by an attacker, exposing them deliberately and
making them highly attractive for a hacker in search of a target.
• Finally, the server is loaded with monitoring and tracking tools so every
step and trace of activity left by a hacker can be recorded in a log,
indicating those traces of activity in a detailed way
Working model of
Honeypot
CLASSIFICATION
• High interaction
• Low interaction
By level of interaction
• Physical
• Virtual
By level of implementation
• Production
• Research
By level of purpose
HIGH INTERACTION HONEYPOT
• Involved in real operating system and applications.
• Picture of how an attack was progresses or how a malware executes in
real time
LOW INTERACTION HONEYPOT
• Allows only limited interaction for an attacker or malware.
• Easy to implement,deploy.
• Simulates some aspects of the system
PHYSICAL HONEYPOT
• Runs on physical machine and often implies high-interaction.
• For large address spaces, it is impractical or impossible to deploy a
physical honeypot for each IP address
• Typically expensive to install and maintain.
VIRTUAL HONEYPOT
• Thousands of honeypots on just one machine. They are inexpensive to
deploy and accessible to almost everyone
• Usually VMware [3] or User-Mode Linux (UML) are used to set up such
virtual honeypots
• Virtual honeypots are better than physical honeypots are scalability and
ease of maintenance
PRODUCTION HONEYPOT
• These are used in performing an advanced detection function, And
detects attacks which are not caught by other security systems
• measures should be taken to avoid a real attack.
• The system can provide information for statistics of monthly happened
attacks.
RESEARCH HONEYPOT
• Used to learn about the tactics and techniques of the Blackhat
community
• When a system was compromised the administrators usually find the
tools used by the attacker but there is no information about how they
were used.
• A Honeypot gives a real-live insight on how the attack happened.
SOME POPULAR HONEYPOTS
• Delilah - Elasticsearch Honeypot written in Python (originally from Novetta).
• ESPot - Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit
CVE-2014-3120.
• Bukkit Honeypot - Honeypot plugin for Bukkit.
• EoHoneypotBundle - Honeypot type for Symfony2 forms.
• Google Hack Honeypot - Designed to provide reconnaissance against attackers that
use search engines as a hacking tool against your resources.
• Laravel Application Honeypot - Simple spam prevention package for Laravel
applications.
CONCLUSION
A honeypot is an illusion that is weaved for the attacker.
The illusion can be as creative as we want it to be. A good illusion will get
us zero day exploits, root kits, and loads of information on how attackers
work.
The key point here is only a best thief can become a best
cop, just because, he knows how thefts are done and thus could recover.
Same way it is very important to know how the patterns of attacks used
by the blackhat community. This helps us design fool proof security
systems.
Honeypot a trap to hackers

More Related Content

What's hot

All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
Arya AR
 
Honeypot
HoneypotHoneypot
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
tushar mandal
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
Ravindra Singh Rathore
 
Honeypot
HoneypotHoneypot
Honeypot
Sajan Sahu
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
Vishal Tandel
 
What are Honeypots? and how are they deployed?
What are Honeypots? and how are they deployed?What are Honeypots? and how are they deployed?
What are Honeypots? and how are they deployed?
HusseinMuhaisen
 
Honeypots
HoneypotsHoneypots
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
Manoj kumawat
 
Honeypot
HoneypotHoneypot
Honeypot
Akhil Sahajan
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
KirtiGoyal25
 
Honeypots
HoneypotsHoneypots
Honeypots
SARANYA S
 
Honey pots
Honey potsHoney pots
Honey pots
Divya korrapati
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
Momita Sharma
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
Rasool Irfan
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
Inder NeGi
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
icanhasfay
 

What's hot (20)

All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot
HoneypotHoneypot
Honeypot
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
What are Honeypots? and how are they deployed?
What are Honeypots? and how are they deployed?What are Honeypots? and how are they deployed?
What are Honeypots? and how are they deployed?
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots.ppt1800363876
Honeypots.ppt1800363876Honeypots.ppt1800363876
Honeypots.ppt1800363876
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypot seminar report
Honeypot seminar reportHoneypot seminar report
Honeypot seminar report
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 

Similar to Honeypot a trap to hackers

Honeypot
HoneypotHoneypot
Honeypot
umarani95
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
DetSersi
 
Honeypot
HoneypotHoneypot
Honeypot
KirtiGoyal25
 
Honeypot
HoneypotHoneypot
Honeypot
Akhil Sahajan
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
krishna chaitanya
 
Honey pots
Honey potsHoney pots
Honey pots
Alok Singh
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
BhanuriBharathkumar
 
Honeypots
HoneypotsHoneypots
Honeypots
Bilal ZIANE
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
Sina Manavi
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
Shah Sheikh
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
IRJET Journal
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
inf8nity
 
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
Indonesia Network Operators Group
 
Honeypot
HoneypotHoneypot
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
EC-Council
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Samip Shah
 
Honeypots
HoneypotsHoneypots
Honeypots
Jyoti Nagargoje
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
INFOGAIN PUBLICATION
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
INFOGAIN PUBLICATION
 

Similar to Honeypot a trap to hackers (20)

Honeypot
HoneypotHoneypot
Honeypot
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honeypot
HoneypotHoneypot
Honeypot
 
Honey pot day 1
Honey pot day 1Honey pot day 1
Honey pot day 1
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
LT02 IDNOG04 - Charles Lim (Indonesia Honeynet Project) - Using Honeypot to d...
 
Honeypot
HoneypotHoneypot
Honeypot
 
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
 
Honeypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion DetectionHoneypot: A Security Tool in Intrusion Detection
Honeypot: A Security Tool in Intrusion Detection
 

Recently uploaded

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 

Recently uploaded (20)

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 

Honeypot a trap to hackers

  • 1. HONEYPOT A T R A P F O R H A C K E R S BY B H A S K A R A S A I C H I T T U R I
  • 2. CONTENTS • Introduction • History • What is Honeypot • Why you should • How it works • Classification • Some famous Honeypots • Conclusion
  • 3. INTRO • Today internet is growing very fast and the number of websites is doubled for every 53 days and the users of internet also growing. At the same time cyber crimes also growing very fast. • As in the army, it is very essential to know, who the enemy is, and what kind of tactics he uses, what he is aiming for to gather as much information as possible is the main goal of Honeypot. • Honeypot is an exciting new technology with enormous potential for the security community.
  • 4. HISTORY • The idea of honeypot began in 1991 with two publications “The Cuckoos Egg” and “ An evening with beford ”. • The First Honeypot was released in 1997 called the “Deceptive Tool Kit” the point of this kit was to use deception to attack back. • In 1998 the first commercial Honeypot came out This was called as “Cyber Cop Sting”. • In 2017, Dutch police successfully used this Honeypot techniques to track the users of the Darknet Market Hansa.
  • 5. WHAT IS HONEYPOT? According to Lance Spitzner, A honeypot is a resource whose value is being in attacked or compromised. This means, that a Honeypot is expected to get probed, attacked and potentially exploited. Honeypots do not fix anything they provide us with additional, valuable information. Honeypots are a highly flexible security tool with different applications for security. They don't fix a single problem. Instead they have multiple uses, such as prevention, detection, or information gathering.
  • 6. WHY YOU SHOULD USE? • Firstly, to divert the attention of attacker from the real network, in a way that the main information resources are not compromised • Secondly, to build attacker profiles in order to identify their preferred attacking methods, like criminal profile. • Thirdly, to identify new vulnerabilities and risks of various operating systems, environments and programs which are not thoroughly identified at the moment.
  • 7. HOW IT WORKS • Honeypots are, in their most basic form, fake information severs strategically-positioned in a test network, which are fed with false information made unrecognizable as files of classified nature • To break into Honeypot by an attacker, exposing them deliberately and making them highly attractive for a hacker in search of a target. • Finally, the server is loaded with monitoring and tracking tools so every step and trace of activity left by a hacker can be recorded in a log, indicating those traces of activity in a detailed way
  • 9. CLASSIFICATION • High interaction • Low interaction By level of interaction • Physical • Virtual By level of implementation • Production • Research By level of purpose
  • 10. HIGH INTERACTION HONEYPOT • Involved in real operating system and applications. • Picture of how an attack was progresses or how a malware executes in real time
  • 11. LOW INTERACTION HONEYPOT • Allows only limited interaction for an attacker or malware. • Easy to implement,deploy. • Simulates some aspects of the system
  • 12. PHYSICAL HONEYPOT • Runs on physical machine and often implies high-interaction. • For large address spaces, it is impractical or impossible to deploy a physical honeypot for each IP address • Typically expensive to install and maintain.
  • 13. VIRTUAL HONEYPOT • Thousands of honeypots on just one machine. They are inexpensive to deploy and accessible to almost everyone • Usually VMware [3] or User-Mode Linux (UML) are used to set up such virtual honeypots • Virtual honeypots are better than physical honeypots are scalability and ease of maintenance
  • 14. PRODUCTION HONEYPOT • These are used in performing an advanced detection function, And detects attacks which are not caught by other security systems • measures should be taken to avoid a real attack. • The system can provide information for statistics of monthly happened attacks.
  • 15. RESEARCH HONEYPOT • Used to learn about the tactics and techniques of the Blackhat community • When a system was compromised the administrators usually find the tools used by the attacker but there is no information about how they were used. • A Honeypot gives a real-live insight on how the attack happened.
  • 16. SOME POPULAR HONEYPOTS • Delilah - Elasticsearch Honeypot written in Python (originally from Novetta). • ESPot - Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120. • Bukkit Honeypot - Honeypot plugin for Bukkit. • EoHoneypotBundle - Honeypot type for Symfony2 forms. • Google Hack Honeypot - Designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources. • Laravel Application Honeypot - Simple spam prevention package for Laravel applications.
  • 17. CONCLUSION A honeypot is an illusion that is weaved for the attacker. The illusion can be as creative as we want it to be. A good illusion will get us zero day exploits, root kits, and loads of information on how attackers work. The key point here is only a best thief can become a best cop, just because, he knows how thefts are done and thus could recover. Same way it is very important to know how the patterns of attacks used by the blackhat community. This helps us design fool proof security systems.