Professional Documents
Culture Documents
Hands-on session
By :
(1) Rushikesh Kulkarni
(2) Samarth Suresh
General understanding :
(1) Diverting the user from the original application, hence giving the
hacker the misconception that he/she managed to hack the system.
Types of honeypots:
(1)Database Honeypots
Databases are most vulnerable to sqli attacks. So the most
databases today include the honeypot architecture.Intruder
runs through a trap database while the web application still
remains functional.
(1)Email traps also called Spam-traps
Used for collecting spam messages.
The honeypot detects a message is spam and hence further
blocks that email address from sending it to another user on
the same network.
Types of honeypots:
(3) Malware Honeypot :
Make a copy of the existing malware and test it by running
the existing malware vectors. This can be used for scanning
of USB’s to test for malware.
(1)Working with
HoneyDrive
(2)Working with
Pentbox.
Programmed in Ruby , it is a
security kit that will help ethical
hackers to perform their job more
PentBox easily.
Browse to /honeydrive/kippo/data/userdb.txt
root:0:anonymousclub