Monday, 25 February 2013

honeyd on backtrack 5


HONEYD

INTRODUCTION

  • Honeyd is an open ssource program which is already installed on Backtrack 5 distribution .
  • Honeyd is created by Niels Provos .
  • Do a google to fid Niels Provos and give special thanks for this wonderful program . 
  • Honeyd is used in the fields of information security 
WHY WE USE HONEYD ?
  • Honeyd is a used to set up and run multiple virtual hosts on a computer network.
  • There are different type of honeypot solutions and why i use honeyd in this tutorial is because it is easy to deploy .
  • Honeyd has the ability to mimic many different hosts at once .
  • For example : Suppose  in a network there is only 2 real servers and one server is running honeyd , then the network will appear running hundreds of servers to a hacker .And when hacker take more interest on these open servers , the hacker may get caught in the honeypot .Also through the analysis of logs security expert can analyse lots of information . 
HOW TO OPEN HONEYD ON BACKTRACK 5 
  • To open honeyd > Goto BackTrack > Exploitation Tools > Social Engineering Tools > HoneyPots >honeyd 
  • See the below image for more help -
HOW TO OPEN HONEYD ON BACKTRACK 5
HOW TO OPEN HONEY ON BACKTRACK 5 


HONEYD STARTED ON BACKTRACK 5
HONEYD STARTED 
.
CREATING HONEYD CONFIG FILE 
  • In this step you have to create a honeyd.conf file .
  • To create a text file we use gedit 
  • Enter the following command as shown below - 
OPEN HONEYD.CONF WITH GEDIT
OPEN HONEYD.CONF WITH GEDIT ON BACKTRACK 5 GNOME 

EDIT honeyd.conf FILE WITH GEDIT 

  • Inside the honeyd config file , we  creating the windows template . 
  • You can create many number of templates inside honeyd.conf file . 
  • In windows template we are defining number of things , such as 
  1. First we are setting the personality, meaning when another device on the network connects to this honeypot it will appear to be a Windows XP Pro SP1 .
  2. In the windows template I’m also opening up three ports (23, 25, and 80). These are the ports that are opened on a windows machine . The “set windows ethernet” sets a MAC address for our honeypot. 
NOTE : You ca make MAC address of anytype like as shown in our example : aa:bb:cc:dd:ee:ff
 
    4. Finally at the end we bind the ip address of our honeypot as 192.168.85.126 . 
     
     5. And if you want to acquire ip address from dhcp then you have to enter this line instead of the last line shown in the below image .

For acquire ip from dhcp use this line : dhcp windows on eth0 

CONFIGURING HONEYD.CONF FILE
CONFIGURING HONEYD.CONF FILE 

LAUNCHING HONEYPOT 
  • To launch honeyd , simply enter the following command .
  • Command Used : honeyd -d -f  honeyd.conf 
  • Here we use -d option so it doesen't run on the background as a deamon .
  • See the below image what output it shows for more help -
LAUNCHING HONEYD ON BACKTRACK 5
LAUNCHING HONEYD

EXAMPLE 1 
ON WINDOWS XP MACHINE 
  • From windows XP which has a ip address 192.168.85.133 .
  • From Windows XP , when we ping the honeyd ip address 192.168.85.126 , it successfully ping , it means our honeyd is working . 
  • See the below image for more details -

PING THE HONEYD IP FROM WINDOWS XP
PING THE HONEYD IP FROM WINDOWS XP

ON BACKTRACK 5 MACHINE 
  • Here you can see the result on honeyd , it shows that sending of ICMP Echo Reply back to windows xp from honeyd .
  • See the below image for more details - 

ICMP ECHO REPLY (HONEYD)

EXAMPLE 2 
XPROBE 2
ON BACKTRACK 4 MACHINE 
  • Now on backtrack 4 machine we use the xprobe2 to fingerprint the honeyd.
  • See the below image for more help -

Running XPROBE2 on backtrack 4
XPROBE2 ON BACKTRACK4 

BACKTRACK 5 MACHINE 
  • It shows the result on the honeyd , see the below image for more details .

HONEYD ON BACKTRACK 5
XPROBE RESULT ON HONEYD 

SAVE IN OUTPUT FILE

  • You can also save the results in the log file using -l filename  options . 
THINGS TO REMEMBER 
  • You can use different other editor in backtrack like gedit , vim and nano . 
  • In this tutorial we use backtrack 5 gnome .
  • In KDE , you have to use VIM or Nano editor instead of gedit . Why because gedit is not installed on backtrack 5 KDE . 
  • Soon more example will be added and for more frequently ask questions you can go through with this page : http://www.honeyd.org/faq.php

JOIN US 
ON 
FACEBOOK


THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /-

2 comments:

Anonymous said...

honeyd has not been upgraded since 2007, is there any updates on it? or alternatives?

Anonymous said...

Geting this error,
"honeyd: parsing configration file failed"
Can you tell whre am I going wrong?

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts