Wednesday 12 September 2012

honeypot on backtrack 5


 Honeypot
honeypot on backtrack 5

Introduction
  • Using Pentbox ,we are going to create  a small honeypot . (just for educational purpose only ).
  • We set the honeypot on backtrack 5 .
How to create a small honeypot
pentbox

NETWORK TOOLS 
  • To select network tools you have to enter number : 2 
  • See the below image for more details - 
HONEYPOT 
  • After pressing enter key network tools options will display , now you have to select the Honeypot options .
  • To select honey , enter number 3 and press enter key .
  • See the below image for more details - 

honeypot on backtrack 5
  
// Honeypot Setting //
  • Now select the 2nd option ( Manual Configuration ).
  • Enter number : 2 and press enter key 
honeypot on backtrack 5

Insert Port number 
  • Insert the port number , here in my case i have enter port 23 . 
  • See the below image for more details - 
insert port number

Insert false message 
  • Now insert the false Message , i have entered ( Show in the below image ) . 
  • You can type any message . Which is display on the attacker machine when they try to connect port 23 .
  • See the below image for more detials - 
Insert false message

Save a log 
  • To save all the intrusions in a log file ,  you have to enter y(yes) option . 
  • Next , it will display the default path of log file , this option will activated if you don't give any manual path .
  • See the below image for more details - 
save a log

Activate Beep sound
  • If you activated Beep sound , then whenwver a intrusion takes place a beep sound will alert you . 
  • To activate beep sound , insert y (yes) and  press enter key . 
  • See the below image for more details - 

activate beep sound


ATTACKER SYSTEM 
  • Suppose this is a attacker system ( metasploitable ) .
  • When attacker is try to connect to port 23 , he got the fake message which we enter at the time of manual configuration . 
  • See the below image for more details -  

metasploitable attacker system

BACKTRACK 5 

  • Below on the Backtrack 5 machine , some intrusion detected  from 192.168.232.129.
  • So now we can say our honeypot is working successfully .
  • See the below image for more details - 

Intrusion detected on backtrack 5


LOGFILE 
  • Now let see the log file , is it filled with intrusions or not . 
  • To open log file , go to its default location as shown below -
  • See the below image for help - 
logfile on backtrack 5

This is how we can use this small honeypot on backtrack 5 
If you like it and wanna need more updates

No comments:

Post a Comment