Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Web Application Honeypot

No description
by

ashwini pawar

on 14 August 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Web Application Honeypot

Proposed Honeypot Architecture

Introduction
(Cont...)

Applications of honeypot .

Functionalities of our honeypot.
Emulating HTTP Service
Emulating Telnet Service
Proposed System Architecture:

PATH TO IMPLEMENTATION

We developed two modules :

Honeypot TELNET Service.

Honeypot HTTP Service.
Implications
Advantages of Research Honeypot

-Analysis related to captured Data.

-Examinations and observation.

-More knowledge about the black-hat community.

-No additional storage and cost requirements.




Web Application Honeypot
FUTURE WORK

Honeypot can be extended to emulate even the FTP, SMTP services

Dymanic Honeypot
TYPES OF HONEYPOT
Introduction
What is a honeypot?

Types of honeypot.
TELNET REPORT
Worst Password Report:

Compare Passwords in our system with a Worst Password File.
File taken from PasswordResearch.com which contains worlds 10,000 worst passwords.
TELNET REPORTS
Brute Force Attack Report:

The Two ways to attack are:
By logging through as an admin using other IP address.
By trying different combinations of the same password.
TELNET REPORT
Password Length Report.

Sessions Captured Per Day.

Password Length Analysis.
Full transcript