Whitepaper (1)
Whitepaper (1)
2. Prerequisites
3. Step-by-Step Implementation
• Set up Honeyd to simulate vulnerable services such as HTTP, SSH, FTP, and
others.
Verify installation:
honeyd -h
Example configuration:
create default
set default personality "Linux 2.6"
• Use tools like Wireshark or tcpdump to capture network traffic from attackers
attempting to interact with the honeypot.
Start Wireshark:
tcp.port == 22
• Review the logs to identify attack vectors, including port scans, brute force
attempts, and other malicious activities.
• Deploy at least two honeypots using Honeyd or another tool (e.g., Dionaea).
Verify installation:
snort -V
• Use default Snort rules or create custom rules to detect attacks like port scans,
DoS, or buffer overflow attempts.
• Test Snort by simulating attacks (e.g., using nmap or Metasploit) against the
honeypot and observe detections.
alert tcp any any -> any 22 (msg:"SSH Connection Attempt"; sid:1000001;)
Restart Snort:
4. Conclusion
5. References