0% found this document useful (0 votes)
55 views5 pages

HoneyBOT Traffic Analysis Report

The document discusses the HoneyBOT project, highlighting the capture of 1,336 packets and the logging of various traffic types. It includes screenshots demonstrating a successful FTP interaction where the author's name was used as credentials. The project illustrates how HoneyBOT functions as a honeypot to identify network probes and record interactions without any encountered challenges.

Uploaded by

paul mulwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views5 pages

HoneyBOT Traffic Analysis Report

The document discusses the HoneyBOT project, highlighting the capture of 1,336 packets and the logging of various traffic types. It includes screenshots demonstrating a successful FTP interaction where the author's name was used as credentials. The project illustrates how HoneyBOT functions as a honeypot to identify network probes and record interactions without any encountered challenges.

Uploaded by

paul mulwa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1

266 HonEYbot

Student’s Name

Institution Affiliation

Instructor
2

266 HonEYbot

The image above (figure one) shows the total number of packets captured which are 1336

The image above (figure

two) shows the interface of

HoneyBOT traffic

generated logged by

HoneyBOT.
3

The image above (figure three) shows HoneyBOTlog entry showing my first and last name being

used to access the local FTP server.

Summary

The HoneyBOT screenshots enclosed below offer more information on the interactions

that were captured. The first picture shows that 1,336 packets were captured through the project

to determine the networks in use. The second snapshot offered is the HoneyBOT traffic log

displaying the range of traffic types logged and the proof of the honeypot’s capability to emulate

certain weaknesses and capture attempted connections. The last screenshots show a successful

FTP interaction, and my first and last names were typed as username and password, respectively.

These captures show how HoneyBOT can represent the target susceptible to scans and how

honeypots work when identifying potential probes and storing records of every interaction. I did

not encounter any challenges in the project.

Summary
4

The HoneyBOT screenshots enclosed below offer more information on the interactions

that were captured. The first picture shows that 1,336 packets were captured through the project

to determine the networks in use. The second snapshot offered is the HoneyBOT traffic log

displaying the range of traffic types logged and the proof of the honeypot’s capability to emulate

certain weaknesses and capture attempted connections. The last screenshots show a successful

FTP interaction, and my first and last names were typed as username and password, respectively.

These captures show how HoneyBOT can represent the target susceptible to scans and how

honeypots work when identifying potential probes and storing records of every interaction. I did

not encounter any challenges in the project.


5

You might also like