Zenmap and Honeybot Manual
Zenmap and Honeybot Manual
ON
ZENMAP & HONEYBOT
PREPARED BY:
Prof. Maitreyee Dutta and Mr. Vipul Mandhar (Project Assistant)
0
Table of Contents
MANUAL-1: ............................................................................................ 3
A Practical Approach to make a trap for the Attacker....................... 3
What is a Computer Network? .................................................................. 4
What is Information Technology (IT)? ..................................................... 4
Computer Technologies ........................................................................ 5
Communication Technology ................................................................. 5
Network Essentials ................................................................................ 5
What is a Port? ........................................................................................ 6
Types of ports ........................................................................................ 6
Hardware Ports .................................................................................. 6
Software Ports ................................................................................... 6
................................................................................................................... 8
INSTALLATION OF KALI LINUX OPERATING SYSTEM IN
VMWARE WORKSTATION .............................................................. 10
Basics Requirements ........................................................................... 10
What is Zenmap ..................................................................................... 13
Types of scanning done by Zenmap.................................................... 13
Steps to run Zenmap ............................................................................ 15
WHAT ARE HONEYPOTS? ............................................................... 21
Classification of Honeypots ................................................................ 21
High interaction ............................................................................... 21
Low interaction................................................................................ 22
Physical Honeypots ......................................................................... 22
Virtual Honeypots ........................................................................... 22
Production Honeypots ..................................................................... 22
1
Research Honeypots ........................................................................ 22
What is HoneyBOT ............................................................................... 23
How does it works? ............................................................................. 23
Steps to download and run Honey bot ............................................ 24
2
MANUAL-1:
A Practical
Approach to
make a trap
for the
Attacker
3
What is a Computer Network?
When two or more computers or communications devices are connected
together by transmission media and channels and guided by a set of rules
for communication purposes that allow users to communicate with each
other and share information and data.
Information
Technologies
Computer Communication
Technology Technology
4
Computer Technologies
Communication Technology
Network Essentials
Transmission Control
Mesh Topology WAN
Protocol/Internet Protocol
5
What is a Port?
In computer hardware, a “port” serves as an interface between the
computer and other computer or peripheral devices.
The term “PORT” is derived from a latin word “porta” meaning (gate,
entrance, door)
Types of ports
1. Hardware Ports
2. Software Ports
Hardware Ports
It is a port serves as an interface between the computer and other
computers or peripheral devices. In computer terms, a port generally
refers to the female part of connection. Computer ports have many uses,
to connect a monitor, webcam, speakers, or other peripheral devices. On
the physical layer, a computer port is a specialized outlet on a piece of
equipment to which a plug or cable connects.
Software Ports
A software port (usually just called a 'port') is a virtual/logical data connection
that can be used by programs to exchange data directly.
The most common of these are TCP and UDP ports, which are used to
6
exchange data between computers on the Internet.
7
FTP is one of the most commonly used file transfer protocols
on the Internet and within private networks. An FTP server
can easily be set up with little networking knowledge and
provides the ability to easily relocate files from one system
to another. FTP control is handled on TCP port 21 and its
data transfer can use TCP port 20 as well as dynamic ports
depending on the specific configuration.
23 Telnet TCP
50, 51 IPSec
8
Dynamic Host Configuration Protocol
67, 68 UDP
(DHCP)
9
INSTALLATION OF KALI LINUX
OPERATING SYSTEM IN
VMWARE WORKSTATION
Basics Requirements
Minimum requirements in Computer: 8 GB RAM, 500 GB internal
memory
VMware must be installed in main OS.
Microsoft Windows 7/8/10 must be installed in VMware.
Kali OS must be installed in VMware.
11
Select the Finish Partitioning and write changes to disk which should
be selected by default.
A dialog box will appear to confirm changes to disk. Select yes and
click continue.
Wait for the installation to complete.
A dialog box will appear to configure network mirror for Package
manager. Select yes.
A dialog box will appear to install the GRUB boot loader. Select yes.
Select /dev/sda and click Continue.
Wait for the installation to complete.
Login with username: root, Password: what you entered during the
installation process earlier (or toor if you have not entered any
password).
12
What is Zenmap
Zenmap is the official Nmap Security Scanner GUI. It is a multi- latform
(Linux, Windows, Mac OS X, BSD, etc.) free and open source application
which aims to make Nmap easy for beginners to use while providing
advanced features for experienced Nmap users. Frequently used scans can
be saved as profiles to make them easy to run repeatedly. A command
creator allows interactive creation of Nmap command lines. Scan results
can be saved and viewed later. Saved scan results can be compared with
one another to see how they differ. The results of recent scans are stored
in a searchable database.
13
reply. It can be utilized for testing and troubleshooting the network
connectivity.
Quick scan: This Scan faster than the intense scan as it scans limited
numbers of TCP ports that are common utilizing timing templates. It scans
common places in the network that are vulnerable.
Quick scan plus: It is a quick scan with addition of Operating System
and version detection.
Regular scan: This scans everything by default. This is a simple
mechanism helps in making the network functioning healthy. This is The
TCP SYN scan for common 1000 TCP ports utilizing the ICMP Echo ping
for host detection is done.
Slow comprehensive scan: It is a prominent and accurate scan that relies
on different protocols i.e. TCP, UDP and SCTP to evaluate the hosts. If a
host is detected then it identifies the Operating System, services and
versions the host is running.
14
Steps to run Zenmap
15
Step 3: Open cmd to get the IP Address
16
Step 6: In Attackers machine i.e Kali just type the IP address of main
machine to scan the open ports. As shown in fig.
17
Step 7: We have so many different options to scan an particular IP
Address as shown in fig. given below.
18
Step 9: After selecting the scan type i.e Quick scan the click on Scan
button.
Step 11: After the scanning process it will show results like this, that
following ports are open on the Operating system whose IP
address is 192.168.43.88 (main machine).
19
20
WHAT ARE HONEYPOTS?
Honeypot is an exciting new technology with enormous potential for the
security community.
According to Lance Spitzner, founder of honeypot project: “A honeypot
is an information system resource whose value lies in unauthorized or
illicit use of that resource.”
Used for monitoring, detecting and analyzing attacks.
Classification of Honeypots
By level of By By
Interaction Implementation Purpose
High interaction
Simulates all aspects of the OS: real systems.
Can be compromised completely, higher risk.
Provide More Information
21
Eg:-Honeynet
Low interaction
Simulates some aspects of the system.
Easy to deploy, minimal risk
Provide Limited Information
Physical Honeypots
Real machines
Own IP Address
High Intractive
Virtual Honeypots
Simulated by other machines that:
o Respond to the network traffic sent to the honeypots.
o May simulate a lot of (different) virtual honeypots at the same
time.
Production Honeypots
Help to mitigate risk in your organizations
It is further classified in 3 categories.
1. Prevention
o Keeping the bad guys out
o Mechanism such as encryption prevent attackers from
accessing critical information.
2. Detection
o Detecting the attacker when he breaks in.
o Challenges: False positive, False negative
3. Response
o Can easily be pulled offline.
Research Honeypots
Capture extensive information.
Used primarily by research, military, government organization.
22
What is HoneyBOT
HoneyBOT is a medium interaction honeypot for windows.
A honeypot creates a safe environment to capture and interact with
unsolicited and often malicious traffic on a network. HoneyBOT is an
easy to use solution ideal for network security research or as part of an
early warning IDS. The logging capability of a honeypot is far greater
than any other network security tool and captures raw packet level data
even including the keystrokes and mistakes made by hackers. The
captured information is highly valuable as it contains only malicious
traffic with little to no false positives. Honeypots are becoming one of the
leading security tools used to monitor the latest tricks and exploits of
hackers by recording their every move so that the security community can
more quickly respond to new exploits.
23
Steps to download and run Honey bot
Step 1: To Download the honeybot visit the official web site i.e.
https://www.atomicsoftwaresolutions.com/
24
Step 4: After that double click on setup of Honeybots to run.
25
Step 6: Click on start before running the Zenmap in attackers
machine.
26
Step 8: After that run Zenmap in attackers OS i.e. Kali
Step 10: From the following scanning type we choose Quick scan to
get the information of Main Machine.
27
Step 11: After selecting the scan type i.e Quick scan the click on Scan
button.
28
Step 12: Scanning process will start
Step 13: After the scanning process it will show results like this, that
following ports are open on the Operating system whose IP
address is 192.168.43.88 (main machine).
After start the Honeybot it will show some fake open Port to attract
the Attacker.
29
Step 14: We are able to scan differen IP addresses by single scan in
Honeybot
Step 15: In setting we are also able to ADD, EDIT, or DELETE any
Services
30