1
266 HonEYbot
Student’s Name
Institution Affiliation
Instructor
2
266 HonEYbot
The image above (figure one) shows the total number of packets captured which are 1336
The image above (figure
two) shows the interface of
HoneyBOT traffic
generated logged by
HoneyBOT.
3
The image above (figure three) shows HoneyBOTlog entry showing my first and last name being
used to access the local FTP server.
Summary
The HoneyBOT screenshots enclosed below offer more information on the interactions
that were captured. The first picture shows that 1,336 packets were captured through the project
to determine the networks in use. The second snapshot offered is the HoneyBOT traffic log
displaying the range of traffic types logged and the proof of the honeypot’s capability to emulate
certain weaknesses and capture attempted connections. The last screenshots show a successful
FTP interaction, and my first and last names were typed as username and password, respectively.
These captures show how HoneyBOT can represent the target susceptible to scans and how
honeypots work when identifying potential probes and storing records of every interaction. I did
not encounter any challenges in the project.
Summary
4
The HoneyBOT screenshots enclosed below offer more information on the interactions
that were captured. The first picture shows that 1,336 packets were captured through the project
to determine the networks in use. The second snapshot offered is the HoneyBOT traffic log
displaying the range of traffic types logged and the proof of the honeypot’s capability to emulate
certain weaknesses and capture attempted connections. The last screenshots show a successful
FTP interaction, and my first and last names were typed as username and password, respectively.
These captures show how HoneyBOT can represent the target susceptible to scans and how
honeypots work when identifying potential probes and storing records of every interaction. I did
not encounter any challenges in the project.
5