SlideShare a Scribd company logo
Honey Pots
Hussein Muhaisen AKA System Exploited
1
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
What are honey
pots?
•Honey pots are basically decoy ( fake )
systems deployed by people , organizations
and other entities to log user activity and
the way they approach the system to hack
it or do any other activity on it.
2
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Honey pot illustration
3
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
why are honey
pots deployed?
•The simple answer is that honey
pots are deployed for people/orgs to
study how an attacker behaves
, examine his moves, and
sometimes they are deployed for
other uses like confusing the
attacker. 4
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
A basic working
of a honeypot
•Logs users' IP address.
•Keystrokes submitted by the user.
•The resources the user has accessed,
modified, and deleted.
•and a lot of other things! Really ,
you can configure your honeypot to
act based on your needs 5
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Types of honeypots
•Low-interaction honeypots.
•Medium-interaction honeypots.
•High-interaction honeypots.
•Pure honeypots.
6
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Low-Interaction Honeypots
•These types of honeypots run on limited
services , and have restricted permissions, they
can be used to track UDP,TCP,IICMP and other
protocols/services . 7
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Medium-Interaction Honeypots
•These types of honeypots are based on real-time functioning
operating systems they have the same services as the real
application, the purpose of this honey pot is to collect more
information on the attack, and so the organization can take
extra time when mitigating the attack. 8
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
High-Interaction
Honeypots
•These types of honeypots are real
applications but they are
vulnerable, these are hard to
maintain but the success rates are
high.
9
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Pure Honeypots
•These honeypots are deployed on real working environments ! Yes real ones,
so once the attacker sees it he will directly spend time enumerating and
epxloiting it once he does the organization will be alerted, and like that they
knew the attackers ways of attacking the machine, and they will prevent
future attacks like this.
10
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
Honey pots deployments
Honey pots have different types and these
types are:
Email Honeypots -->
Inactive emails waiting for the malicious actor
to send an email, then later analyze the
malicious email sent by the attacker.
Malware Honeypots --> used to
trap malware in the network, then later
analyzed by the ORG.
Database Honeypots --> these
honeypots act as a vulnerable database which
lures attackers into thinking the database is
vulnerable and it has credit cards
for example.
Spider Honeypots --> these
Honeypots are used to stop web crawlers that
crawl the internet for a certain malicious
purpose.
11
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
How to
setup
honeypots
• By the timeyou see this I Will have a video uploaded on my channel on
how to do it youtube.com/SystemExploited
So these are honeypots you can download:
- DigitalOcean offers a honeypot service
- Cowrie
- HoneyPy
- Honeynet
- Honeytrap
-Specter
-KFsensor
This is a curated list of honeypots
https://github.com/paralax/awesome-honeypots
12
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA
atoncehussein
13

More Related Content

What's hot

Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
Kajal Mittal
 
Honeypots
HoneypotsHoneypots
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynetSina Manavi
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Honeypots
HoneypotsHoneypots
Honeypots
Gaurav Gupta
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
Honey pots
Honey potsHoney pots
Honey pots
Divya korrapati
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
Arya AR
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief OverviewSILPI ROSAN
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
amar koppal
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
Kirubaburi R
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
Manoj kumawat
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
tushar mandal
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
milad saber
 
Honeypots
HoneypotsHoneypots
Honeypots
Jayant Gandhi
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
icanhasfay
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
Vishal Tandel
 

What's hot (20)

Honeypot ss
Honeypot ssHoneypot ss
Honeypot ss
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)Honeypots (Ravindra Singh Rathore)
Honeypots (Ravindra Singh Rathore)
 
Honeypot honeynet
Honeypot honeynetHoneypot honeynet
Honeypot honeynet
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot ppt1
Honeypot ppt1Honeypot ppt1
Honeypot ppt1
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Honey pots
Honey potsHoney pots
Honey pots
 
Honey po tppt
Honey po tpptHoney po tppt
Honey po tppt
 
Honeypot-A Brief Overview
Honeypot-A Brief OverviewHoneypot-A Brief Overview
Honeypot-A Brief Overview
 
Honeynet architecture
Honeynet architectureHoneynet architecture
Honeynet architecture
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Honeypot Basics
Honeypot BasicsHoneypot Basics
Honeypot Basics
 
Tushar mandal.honeypot
Tushar mandal.honeypotTushar mandal.honeypot
Tushar mandal.honeypot
 
Honeypot and deception
Honeypot and deceptionHoneypot and deception
Honeypot and deception
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Honeypot Presentation - Using Honeyd
Honeypot Presentation - Using HoneydHoneypot Presentation - Using Honeyd
Honeypot Presentation - Using Honeyd
 
Honeypot
HoneypotHoneypot
Honeypot
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 

Recently uploaded

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Yara Milbes
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 

Recently uploaded (20)

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 

What are Honeypots? and how are they deployed?

  • 1. Honey Pots Hussein Muhaisen AKA System Exploited 1 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 2. What are honey pots? •Honey pots are basically decoy ( fake ) systems deployed by people , organizations and other entities to log user activity and the way they approach the system to hack it or do any other activity on it. 2 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 3. Honey pot illustration 3 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 4. why are honey pots deployed? •The simple answer is that honey pots are deployed for people/orgs to study how an attacker behaves , examine his moves, and sometimes they are deployed for other uses like confusing the attacker. 4 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 5. A basic working of a honeypot •Logs users' IP address. •Keystrokes submitted by the user. •The resources the user has accessed, modified, and deleted. •and a lot of other things! Really , you can configure your honeypot to act based on your needs 5 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 6. Types of honeypots •Low-interaction honeypots. •Medium-interaction honeypots. •High-interaction honeypots. •Pure honeypots. 6 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 7. Low-Interaction Honeypots •These types of honeypots run on limited services , and have restricted permissions, they can be used to track UDP,TCP,IICMP and other protocols/services . 7 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 8. Medium-Interaction Honeypots •These types of honeypots are based on real-time functioning operating systems they have the same services as the real application, the purpose of this honey pot is to collect more information on the attack, and so the organization can take extra time when mitigating the attack. 8 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 9. High-Interaction Honeypots •These types of honeypots are real applications but they are vulnerable, these are hard to maintain but the success rates are high. 9 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 10. Pure Honeypots •These honeypots are deployed on real working environments ! Yes real ones, so once the attacker sees it he will directly spend time enumerating and epxloiting it once he does the organization will be alerted, and like that they knew the attackers ways of attacking the machine, and they will prevent future attacks like this. 10 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 11. Honey pots deployments Honey pots have different types and these types are: Email Honeypots --> Inactive emails waiting for the malicious actor to send an email, then later analyze the malicious email sent by the attacker. Malware Honeypots --> used to trap malware in the network, then later analyzed by the ORG. Database Honeypots --> these honeypots act as a vulnerable database which lures attackers into thinking the database is vulnerable and it has credit cards for example. Spider Honeypots --> these Honeypots are used to stop web crawlers that crawl the internet for a certain malicious purpose. 11 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 12. How to setup honeypots • By the timeyou see this I Will have a video uploaded on my channel on how to do it youtube.com/SystemExploited So these are honeypots you can download: - DigitalOcean offers a honeypot service - Cowrie - HoneyPy - Honeynet - Honeytrap -Specter -KFsensor This is a curated list of honeypots https://github.com/paralax/awesome-honeypots 12 This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein
  • 13. This slide was made with love by Hussein Muhaisen AKA SystemExploited AKA atoncehussein 13